
Mark Hellner
Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )
| Most Active Art Unit | 3645 |
| Art Unit(s) | 3642, 3662, 3645, 3663, 2202 |
| Total Applications | 4179 |
| Issued Applications | 3707 |
| Pending Applications | 224 |
| Abandoned Applications | 288 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 13158245
[patent_doc_number] => 10095849
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-10-09
[patent_title] => Tag-based programming interface authentication
[patent_app_type] => utility
[patent_app_number] => 14/491922
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 8659
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 139
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491922
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491922 | Tag-based programming interface authentication | Sep 18, 2014 | Issued |
Array
(
[id] => 10276390
[patent_doc_number] => 20150161387
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-11
[patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/491458
[patent_app_country] => US
[patent_app_date] => 2014-09-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6693
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491458
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491458 | Determining whether virtual network user is malicious user based on degree of association | Sep 18, 2014 | Issued |
Array
(
[id] => 12938803
[patent_doc_number] => 09832197
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Generating link information to access a file stored in a storage area associated with user identification information
[patent_app_type] => utility
[patent_app_number] => 14/488466
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 29
[patent_figures_cnt] => 39
[patent_no_of_words] => 16308
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488466
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/488466 | Generating link information to access a file stored in a storage area associated with user identification information | Sep 16, 2014 | Issued |
Array
(
[id] => 10734249
[patent_doc_number] => 20160080400
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'FILE REPUTATION EVALUATION'
[patent_app_type] => utility
[patent_app_number] => 14/488719
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 6570
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488719
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/488719 | Chunk-based file acquisition and file reputation evaluation | Sep 16, 2014 | Issued |
Array
(
[id] => 10732095
[patent_doc_number] => 20160078245
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'DATA STORAGE SYSTEMS AND METHODS'
[patent_app_type] => utility
[patent_app_number] => 14/489222
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 25
[patent_figures_cnt] => 25
[patent_no_of_words] => 57881
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489222
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/489222 | Deriving encryption rules based on file content | Sep 16, 2014 | Issued |
Array
(
[id] => 10734223
[patent_doc_number] => 20160080373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'Sensor Information Transparency System and Method'
[patent_app_type] => utility
[patent_app_number] => 14/488695
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3111
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14488695
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/488695 | Sensor Information Transparency System and Method | Sep 16, 2014 | Abandoned |
Array
(
[id] => 10545303
[patent_doc_number] => 09270448
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-23
[patent_title] => 'Encryption key distribution system and method'
[patent_app_type] => utility
[patent_app_number] => 14/489025
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 22
[patent_figures_cnt] => 25
[patent_no_of_words] => 13084
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489025
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/489025 | Encryption key distribution system and method | Sep 16, 2014 | Issued |
Array
(
[id] => 13259199
[patent_doc_number] => 10142301
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-11-27
[patent_title] => Encrypted data delivery without intervening decryption
[patent_app_type] => utility
[patent_app_number] => 14/489161
[patent_app_country] => US
[patent_app_date] => 2014-09-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13026
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 115
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14489161
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/489161 | Encrypted data delivery without intervening decryption | Sep 16, 2014 | Issued |
Array
(
[id] => 10427032
[patent_doc_number] => 20150312043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-29
[patent_title] => 'DIGITAL SIGNATURE SERVER AND USER TERMINAL'
[patent_app_type] => utility
[patent_app_number] => 14/483293
[patent_app_country] => US
[patent_app_date] => 2014-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3991
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483293
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/483293 | DIGITAL SIGNATURE SERVER AND USER TERMINAL | Sep 10, 2014 | Abandoned |
Array
(
[id] => 9926624
[patent_doc_number] => 08984612
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-03-17
[patent_title] => 'Method of identifying an electronic device by browser versions and cookie scheduling'
[patent_app_type] => utility
[patent_app_number] => 14/477351
[patent_app_country] => US
[patent_app_date] => 2014-09-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5303
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 223
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14477351
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/477351 | Method of identifying an electronic device by browser versions and cookie scheduling | Sep 3, 2014 | Issued |
Array
(
[id] => 10526675
[patent_doc_number] => 09253201
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-02-02
[patent_title] => 'Detecting network anomalies by probabilistic modeling of argument strings with markov chains'
[patent_app_type] => utility
[patent_app_number] => 14/476142
[patent_app_country] => US
[patent_app_date] => 2014-09-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9141
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14476142
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/476142 | Detecting network anomalies by probabilistic modeling of argument strings with markov chains | Sep 2, 2014 | Issued |
Array
(
[id] => 11848548
[patent_doc_number] => 09736114
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-08-15
[patent_title] => 'Restricting mature content at a network element having an image scanner'
[patent_app_type] => utility
[patent_app_number] => 14/470262
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10230
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 232
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470262
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/470262 | Restricting mature content at a network element having an image scanner | Aug 26, 2014 | Issued |
Array
(
[id] => 11796096
[patent_doc_number] => 09405927
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-08-02
[patent_title] => 'Tri-module data protection system specification'
[patent_app_type] => utility
[patent_app_number] => 14/466930
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10839
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 714
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14466930
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/466930 | Tri-module data protection system specification | Aug 26, 2014 | Issued |
Array
(
[id] => 10719461
[patent_doc_number] => 20160065608
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'MONITORING SECURITY RISKS TO ENTERPRISE CORRESPONDING TO ACCESS RIGHTS AND ACCESS RISK CALCULATION'
[patent_app_type] => utility
[patent_app_number] => 14/470588
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7731
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470588
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/470588 | Monitoring security risks to enterprise corresponding to access rights and access risk calculation | Aug 26, 2014 | Issued |
Array
(
[id] => 12971161
[patent_doc_number] => 09876644
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-23
[patent_title] => Authenticating data packet based on hash image of the data packet in erasure coding-based data transmission
[patent_app_type] => utility
[patent_app_number] => 14/470051
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 5631
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 98
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470051
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/470051 | Authenticating data packet based on hash image of the data packet in erasure coding-based data transmission | Aug 26, 2014 | Issued |
Array
(
[id] => 9912618
[patent_doc_number] => 20150067821
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-05
[patent_title] => 'METHOD FOR UNLOCKING ELECTRONIC DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/470095
[patent_app_country] => US
[patent_app_date] => 2014-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 1476
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14470095
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/470095 | METHOD FOR UNLOCKING ELECTRONIC DEVICE | Aug 26, 2014 | Abandoned |
Array
(
[id] => 9834763
[patent_doc_number] => 08943598
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-01-27
[patent_title] => 'Automatic compromise detection for hardware signature for payment authentication'
[patent_app_type] => utility
[patent_app_number] => 14/458074
[patent_app_country] => US
[patent_app_date] => 2014-08-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14810
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 126
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14458074
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/458074 | Automatic compromise detection for hardware signature for payment authentication | Aug 11, 2014 | Issued |
Array
(
[id] => 12312810
[patent_doc_number] => 09940652
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-10
[patent_title] => Restrictively exchanging and controlling vehicular data between communication devices of a private network
[patent_app_type] => utility
[patent_app_number] => 14/456182
[patent_app_country] => US
[patent_app_date] => 2014-08-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 14
[patent_no_of_words] => 7532
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 205
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14456182
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/456182 | Restrictively exchanging and controlling vehicular data between communication devices of a private network | Aug 10, 2014 | Issued |
Array
(
[id] => 10249849
[patent_doc_number] => 20150134845
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-14
[patent_title] => 'Object Oriented Communication Among Platform Independent Systems over Networks Using SOAP'
[patent_app_type] => utility
[patent_app_number] => 14/453487
[patent_app_country] => US
[patent_app_date] => 2014-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5727
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453487
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453487 | Object Oriented Communication Among Platform Independent Systems over Networks Using SOAP | Aug 5, 2014 | Abandoned |
Array
(
[id] => 12339312
[patent_doc_number] => 09949116
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-17
[patent_title] => Method and apparatus for establishing SSID-based connection between terminal device and gateway device
[patent_app_type] => utility
[patent_app_number] => 14/901807
[patent_app_country] => US
[patent_app_date] => 2014-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 9
[patent_no_of_words] => 9081
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 206
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14901807
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/901807 | Method and apparatus for establishing SSID-based connection between terminal device and gateway device | Aug 4, 2014 | Issued |