Search

Mark Hellner

Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )

Most Active Art Unit
3645
Art Unit(s)
3642, 3662, 3645, 3663, 2202
Total Applications
4179
Issued Applications
3707
Pending Applications
224
Abandoned Applications
288

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 10509132 [patent_doc_number] => 09237010 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-12 [patent_title] => 'Secure transmission of a message' [patent_app_type] => utility [patent_app_number] => 14/403907 [patent_app_country] => US [patent_app_date] => 2013-04-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 3 [patent_no_of_words] => 4157 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 200 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403907 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/403907
Secure transmission of a message Apr 23, 2013 Issued
Array ( [id] => 11215568 [patent_doc_number] => 09444618 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-09-13 [patent_title] => 'Defense against attacks on ring oscillator-based physically unclonable functions' [patent_app_type] => utility [patent_app_number] => 13/867429 [patent_app_country] => US [patent_app_date] => 2013-04-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 7 [patent_no_of_words] => 3816 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13867429 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/867429
Defense against attacks on ring oscillator-based physically unclonable functions Apr 21, 2013 Issued
Array ( [id] => 10157865 [patent_doc_number] => 09189647 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-17 [patent_title] => 'Encrypted database system, linking method, and medium' [patent_app_type] => utility [patent_app_number] => 14/396560 [patent_app_country] => US [patent_app_date] => 2013-04-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 14068 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 293 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14396560 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/396560
Encrypted database system, linking method, and medium Apr 11, 2013 Issued
Array ( [id] => 10519615 [patent_doc_number] => 09246675 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2016-01-26 [patent_title] => 'Cryptographic systems using pairing with errors' [patent_app_type] => utility [patent_app_number] => 14/491992 [patent_app_country] => US [patent_app_date] => 2013-04-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10029 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 313 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491992 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/491992
Cryptographic systems using pairing with errors Apr 10, 2013 Issued
Array ( [id] => 14250781 [patent_doc_number] => 10275593 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2019-04-30 [patent_title] => Secure computing device using different central processing resources [patent_app_type] => utility [patent_app_number] => 13/854320 [patent_app_country] => US [patent_app_date] => 2013-04-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 28 [patent_figures_cnt] => 38 [patent_no_of_words] => 14636 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 178 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13854320 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/854320
Secure computing device using different central processing resources Mar 31, 2013 Issued
Array ( [id] => 10890848 [patent_doc_number] => 08914863 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-12-16 [patent_title] => 'Enhancing the security of near-field communication' [patent_app_type] => utility [patent_app_number] => 13/853470 [patent_app_country] => US [patent_app_date] => 2013-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 12365 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853470 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/853470
Enhancing the security of near-field communication Mar 28, 2013 Issued
Array ( [id] => 9071535 [patent_doc_number] => 20130263291 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-03 [patent_title] => 'APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION' [patent_app_type] => utility [patent_app_number] => 13/853102 [patent_app_country] => US [patent_app_date] => 2013-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 4902 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853102 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/853102
APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION Mar 28, 2013 Abandoned
Array ( [id] => 9774772 [patent_doc_number] => 20140298435 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-10-02 [patent_title] => 'Authentication using three-dimensional structure' [patent_app_type] => utility [patent_app_number] => 13/853834 [patent_app_country] => US [patent_app_date] => 2013-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5415 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853834 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/853834
Authentication using three-dimensional structure Mar 28, 2013 Issued
Array ( [id] => 9096804 [patent_doc_number] => 20130276115 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-10-17 [patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/852201 [patent_app_country] => US [patent_app_date] => 2013-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 16 [patent_no_of_words] => 6715 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852201 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/852201
Network virtual user risk control method and system Mar 27, 2013 Issued
Array ( [id] => 10513415 [patent_doc_number] => 09240996 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2016-01-19 [patent_title] => 'Method and system for risk-adaptive access control of an application action' [patent_app_type] => utility [patent_app_number] => 13/852865 [patent_app_country] => US [patent_app_date] => 2013-03-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 2423 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 328 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852865 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/852865
Method and system for risk-adaptive access control of an application action Mar 27, 2013 Issued
Array ( [id] => 10144340 [patent_doc_number] => 09177149 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-11-03 [patent_title] => 'Method of detecting malware in an operating system kernel' [patent_app_type] => utility [patent_app_number] => 14/391763 [patent_app_country] => US [patent_app_date] => 2013-03-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 1888 [patent_no_of_claims] => 1 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 138 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14391763 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/391763
Method of detecting malware in an operating system kernel Mar 26, 2013 Issued
Array ( [id] => 8991736 [patent_doc_number] => 20130219017 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-08-22 [patent_title] => 'Content Disposition System and Method for Processing Message Content in a Distributed Environment' [patent_app_type] => utility [patent_app_number] => 13/846208 [patent_app_country] => US [patent_app_date] => 2013-03-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 17 [patent_figures_cnt] => 17 [patent_no_of_words] => 17147 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13846208 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/846208
Content disposition system and method for processing message content in a distributed environment Mar 17, 2013 Issued
Array ( [id] => 9841275 [patent_doc_number] => 20150033357 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2015-01-29 [patent_title] => 'METHOD FOR IMPROVING THE FUNCTIONAL SECURITY AND INCREASING THE AVAILABIILTY OF AN ELECTRONIC CONTROL SYSTEM, AND ELECTRONIC CONTROL SYSTEM' [patent_app_type] => utility [patent_app_number] => 14/381671 [patent_app_country] => US [patent_app_date] => 2013-03-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5014 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381671 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/381671
Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle Mar 4, 2013 Issued
Array ( [id] => 10130984 [patent_doc_number] => 09164819 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2015-10-20 [patent_title] => 'Composing message processing pipelines' [patent_app_type] => utility [patent_app_number] => 13/764984 [patent_app_country] => US [patent_app_date] => 2013-02-12 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 6028 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 272 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13764984 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/764984
Composing message processing pipelines Feb 11, 2013 Issued
Array ( [id] => 9605124 [patent_doc_number] => 20140201806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION' [patent_app_type] => utility [patent_app_number] => 13/741878 [patent_app_country] => US [patent_app_date] => 2013-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5416 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/741878
Runtime risk detection based on user, application, and system action sequence correlation Jan 14, 2013 Issued
Array ( [id] => 9605124 [patent_doc_number] => 20140201806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION' [patent_app_type] => utility [patent_app_number] => 13/741878 [patent_app_country] => US [patent_app_date] => 2013-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5416 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/741878
Runtime risk detection based on user, application, and system action sequence correlation Jan 14, 2013 Issued
Array ( [id] => 9605124 [patent_doc_number] => 20140201806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION' [patent_app_type] => utility [patent_app_number] => 13/741878 [patent_app_country] => US [patent_app_date] => 2013-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5416 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/741878
Runtime risk detection based on user, application, and system action sequence correlation Jan 14, 2013 Issued
Array ( [id] => 9605124 [patent_doc_number] => 20140201806 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-17 [patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION' [patent_app_type] => utility [patent_app_number] => 13/741878 [patent_app_country] => US [patent_app_date] => 2013-01-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 5416 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/741878
Runtime risk detection based on user, application, and system action sequence correlation Jan 14, 2013 Issued
Array ( [id] => 9599461 [patent_doc_number] => 20140196142 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2014-07-10 [patent_title] => 'DEVICE AUTHENTICATION USING LIST OF KNOWN GOOD DEVICES' [patent_app_type] => utility [patent_app_number] => 13/735899 [patent_app_country] => US [patent_app_date] => 2013-01-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 13250 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13735899 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/735899
Accessory device authentication using list of known good devices maintained by host device Jan 6, 2013 Issued
Array ( [id] => 9714670 [patent_doc_number] => 08839273 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2014-09-16 [patent_title] => 'System and method for optimizing user notifications for small computer devices' [patent_app_type] => utility [patent_app_number] => 13/733695 [patent_app_country] => US [patent_app_date] => 2013-01-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 9 [patent_no_of_words] => 5846 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 190 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13733695 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/733695
System and method for optimizing user notifications for small computer devices Jan 2, 2013 Issued
Menu