
Mark Hellner
Examiner (ID: 6753, Phone: (571)272-6981 , Office: P/3645 )
| Most Active Art Unit | 3645 |
| Art Unit(s) | 3642, 3662, 3645, 3663, 2202 |
| Total Applications | 4179 |
| Issued Applications | 3707 |
| Pending Applications | 224 |
| Abandoned Applications | 288 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10509132
[patent_doc_number] => 09237010
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-12
[patent_title] => 'Secure transmission of a message'
[patent_app_type] => utility
[patent_app_number] => 14/403907
[patent_app_country] => US
[patent_app_date] => 2013-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4157
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 200
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14403907
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/403907 | Secure transmission of a message | Apr 23, 2013 | Issued |
Array
(
[id] => 11215568
[patent_doc_number] => 09444618
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-13
[patent_title] => 'Defense against attacks on ring oscillator-based physically unclonable functions'
[patent_app_type] => utility
[patent_app_number] => 13/867429
[patent_app_country] => US
[patent_app_date] => 2013-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 7
[patent_no_of_words] => 3816
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13867429
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/867429 | Defense against attacks on ring oscillator-based physically unclonable functions | Apr 21, 2013 | Issued |
Array
(
[id] => 10157865
[patent_doc_number] => 09189647
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Encrypted database system, linking method, and medium'
[patent_app_type] => utility
[patent_app_number] => 14/396560
[patent_app_country] => US
[patent_app_date] => 2013-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 14068
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14396560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/396560 | Encrypted database system, linking method, and medium | Apr 11, 2013 | Issued |
Array
(
[id] => 10519615
[patent_doc_number] => 09246675
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-26
[patent_title] => 'Cryptographic systems using pairing with errors'
[patent_app_type] => utility
[patent_app_number] => 14/491992
[patent_app_country] => US
[patent_app_date] => 2013-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10029
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 313
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14491992
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/491992 | Cryptographic systems using pairing with errors | Apr 10, 2013 | Issued |
Array
(
[id] => 14250781
[patent_doc_number] => 10275593
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-04-30
[patent_title] => Secure computing device using different central processing resources
[patent_app_type] => utility
[patent_app_number] => 13/854320
[patent_app_country] => US
[patent_app_date] => 2013-04-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 28
[patent_figures_cnt] => 38
[patent_no_of_words] => 14636
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 178
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13854320
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/854320 | Secure computing device using different central processing resources | Mar 31, 2013 | Issued |
Array
(
[id] => 10890848
[patent_doc_number] => 08914863
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-16
[patent_title] => 'Enhancing the security of near-field communication'
[patent_app_type] => utility
[patent_app_number] => 13/853470
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 12365
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853470
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853470 | Enhancing the security of near-field communication | Mar 28, 2013 | Issued |
Array
(
[id] => 9071535
[patent_doc_number] => 20130263291
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION'
[patent_app_type] => utility
[patent_app_number] => 13/853102
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4902
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853102
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853102 | APPARATUS AND METHOD FOR SUPPORTING THEFT PROTECTION | Mar 28, 2013 | Abandoned |
Array
(
[id] => 9774772
[patent_doc_number] => 20140298435
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-02
[patent_title] => 'Authentication using three-dimensional structure'
[patent_app_type] => utility
[patent_app_number] => 13/853834
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5415
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853834
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853834 | Authentication using three-dimensional structure | Mar 28, 2013 | Issued |
Array
(
[id] => 9096804
[patent_doc_number] => 20130276115
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-17
[patent_title] => 'NETWORK VIRTUAL USER RISK CONTROL METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/852201
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 6715
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852201
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/852201 | Network virtual user risk control method and system | Mar 27, 2013 | Issued |
Array
(
[id] => 10513415
[patent_doc_number] => 09240996
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-19
[patent_title] => 'Method and system for risk-adaptive access control of an application action'
[patent_app_type] => utility
[patent_app_number] => 13/852865
[patent_app_country] => US
[patent_app_date] => 2013-03-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 2423
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 328
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13852865
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/852865 | Method and system for risk-adaptive access control of an application action | Mar 27, 2013 | Issued |
Array
(
[id] => 10144340
[patent_doc_number] => 09177149
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Method of detecting malware in an operating system kernel'
[patent_app_type] => utility
[patent_app_number] => 14/391763
[patent_app_country] => US
[patent_app_date] => 2013-03-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 1888
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14391763
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/391763 | Method of detecting malware in an operating system kernel | Mar 26, 2013 | Issued |
Array
(
[id] => 8991736
[patent_doc_number] => 20130219017
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'Content Disposition System and Method for Processing Message Content in a Distributed Environment'
[patent_app_type] => utility
[patent_app_number] => 13/846208
[patent_app_country] => US
[patent_app_date] => 2013-03-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 17147
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13846208
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/846208 | Content disposition system and method for processing message content in a distributed environment | Mar 17, 2013 | Issued |
Array
(
[id] => 9841275
[patent_doc_number] => 20150033357
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-29
[patent_title] => 'METHOD FOR IMPROVING THE FUNCTIONAL SECURITY AND INCREASING THE AVAILABIILTY OF AN ELECTRONIC CONTROL SYSTEM, AND ELECTRONIC CONTROL SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/381671
[patent_app_country] => US
[patent_app_date] => 2013-03-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5014
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14381671
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/381671 | Method and system for analyzing integrity of encrypted data in electronic control system for motor vehicle | Mar 4, 2013 | Issued |
Array
(
[id] => 10130984
[patent_doc_number] => 09164819
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Composing message processing pipelines'
[patent_app_type] => utility
[patent_app_number] => 13/764984
[patent_app_country] => US
[patent_app_date] => 2013-02-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6028
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 272
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13764984
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/764984 | Composing message processing pipelines | Feb 11, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9605124
[patent_doc_number] => 20140201806
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'RUNTIME RISK DETECTION BASED ON USER, APPLICATION, AND SYSTEM ACTION SEQUENCE CORRELATION'
[patent_app_type] => utility
[patent_app_number] => 13/741878
[patent_app_country] => US
[patent_app_date] => 2013-01-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5416
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13741878
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/741878 | Runtime risk detection based on user, application, and system action sequence correlation | Jan 14, 2013 | Issued |
Array
(
[id] => 9599461
[patent_doc_number] => 20140196142
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-10
[patent_title] => 'DEVICE AUTHENTICATION USING LIST OF KNOWN GOOD DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/735899
[patent_app_country] => US
[patent_app_date] => 2013-01-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 13250
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13735899
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/735899 | Accessory device authentication using list of known good devices maintained by host device | Jan 6, 2013 | Issued |
Array
(
[id] => 9714670
[patent_doc_number] => 08839273
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-09-16
[patent_title] => 'System and method for optimizing user notifications for small computer devices'
[patent_app_type] => utility
[patent_app_number] => 13/733695
[patent_app_country] => US
[patent_app_date] => 2013-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 9
[patent_no_of_words] => 5846
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 190
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13733695
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/733695 | System and method for optimizing user notifications for small computer devices | Jan 2, 2013 | Issued |