Milton Nelson Jr
Examiner (ID: 2707, Phone: (571)272-6861 , Office: P/3636 )
Most Active Art Unit | 3636 |
Art Unit(s) | 3636, 3507, 2899, 3624 |
Total Applications | 4234 |
Issued Applications | 3539 |
Pending Applications | 189 |
Abandoned Applications | 505 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 14829715
[patent_doc_number] => 10411882
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-10
[patent_title] => Multiparty secure calculation method protected against a malevolent party
[patent_app_type] => utility
[patent_app_number] => 15/418352
[patent_app_country] => US
[patent_app_date] => 2017-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9763
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15418352
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/418352 | Multiparty secure calculation method protected against a malevolent party | Jan 26, 2017 | Issued |
Array
(
[id] => 13818009
[patent_doc_number] => 10185773
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-01-22
[patent_title] => Systems and methods of precision sharing of big data
[patent_app_type] => utility
[patent_app_number] => 15/415713
[patent_app_country] => US
[patent_app_date] => 2017-01-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9245
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15415713
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/415713 | Systems and methods of precision sharing of big data | Jan 24, 2017 | Issued |
Array
(
[id] => 15789727
[patent_doc_number] => 10628590
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-21
[patent_title] => Application security assessment
[patent_app_type] => utility
[patent_app_number] => 15/413751
[patent_app_country] => US
[patent_app_date] => 2017-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5539
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 136
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15413751
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/413751 | Application security assessment | Jan 23, 2017 | Issued |
Array
(
[id] => 14891489
[patent_doc_number] => 10425808
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-09-24
[patent_title] => Managing user access in a communications network
[patent_app_type] => utility
[patent_app_number] => 15/410064
[patent_app_country] => US
[patent_app_date] => 2017-01-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 4330
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15410064
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/410064 | Managing user access in a communications network | Jan 18, 2017 | Issued |
Array
(
[id] => 11624178
[patent_doc_number] => 20170134367
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-11
[patent_title] => 'ADAPTIVE TIMEOUTS FOR SECURITY CREDENTIALS'
[patent_app_type] => utility
[patent_app_number] => 15/409120
[patent_app_country] => US
[patent_app_date] => 2017-01-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10374
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15409120
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/409120 | Adaptive timeouts for security credentials | Jan 17, 2017 | Issued |
Array
(
[id] => 11594033
[patent_doc_number] => 20170118445
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-04-27
[patent_title] => 'SURVEILLANCE SERVER, METHOD OF PROCESSING DATA OF SURVEILLANCE SERVER, AND SURVEILLANCE SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 15/402701
[patent_app_country] => US
[patent_app_date] => 2017-01-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6450
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15402701
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/402701 | Surveillance server, method of processing data of surveillance server, and surveillance system | Jan 9, 2017 | Issued |
Array
(
[id] => 12920776
[patent_doc_number] => 20180198768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-12
[patent_title] => SYSTEM AND METHOD FOR PROVIDING AUTOMATED KEYCHAIN GROUPING AND UPDATING
[patent_app_type] => utility
[patent_app_number] => 15/401170
[patent_app_country] => US
[patent_app_date] => 2017-01-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6251
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15401170
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/401170 | SYSTEM AND METHOD FOR PROVIDING AUTOMATED KEYCHAIN GROUPING AND UPDATING | Jan 8, 2017 | Abandoned |
Array
(
[id] => 12899650
[patent_doc_number] => 20180191725
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-07-05
[patent_title] => ACCESS RELATIONSHIPS IN A COMPUTER SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/394871
[patent_app_country] => US
[patent_app_date] => 2016-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 19531
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15394871
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/394871 | Access relationships in a computer system | Dec 29, 2016 | Issued |
Array
(
[id] => 12875194
[patent_doc_number] => 20180183573
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-28
[patent_title] => ULTRA-LIGHTWEIGHT CRYPTOGRAPHY ACCELERATOR SYSTEM
[patent_app_type] => utility
[patent_app_number] => 15/392252
[patent_app_country] => US
[patent_app_date] => 2016-12-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9995
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -22
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15392252
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/392252 | Ultra-lightweight cryptography accelerator system | Dec 27, 2016 | Issued |
Array
(
[id] => 13948611
[patent_doc_number] => 10210081
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-02-19
[patent_title] => Secure garbage collection on a mobile device
[patent_app_type] => utility
[patent_app_number] => 15/389756
[patent_app_country] => US
[patent_app_date] => 2016-12-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 4780
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 91
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15389756
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/389756 | Secure garbage collection on a mobile device | Dec 22, 2016 | Issued |
Array
(
[id] => 12826603
[patent_doc_number] => 20180167373
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-06-14
[patent_title] => COMPUTERIZED SYSTEM AND METHOD FOR AUTOMATICALLY SHARING DEVICE PAIRING CREDENTIALS ACROSS MULTIPLE DEVICES
[patent_app_type] => utility
[patent_app_number] => 15/373373
[patent_app_country] => US
[patent_app_date] => 2016-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11918
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 290
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15373373
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/373373 | Computerized system and method for automatically sharing device pairing credentials across multiple devices | Dec 7, 2016 | Issued |
Array
(
[id] => 11519000
[patent_doc_number] => 20170086075
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-23
[patent_title] => 'IDENTITY AUTHENTICATION BY USING HUMAN BIOLOGICAL CHARACTERISTIC'
[patent_app_type] => utility
[patent_app_number] => 15/371523
[patent_app_country] => US
[patent_app_date] => 2016-12-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 15827
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15371523
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/371523 | Identity authentication by using human biological characteristic | Dec 6, 2016 | Issued |
Array
(
[id] => 12062787
[patent_doc_number] => 20170339131
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-23
[patent_title] => 'INTELLIGENT TASK ASSIGNMENT AND AUTHORIZATION SYSTEMS & METHODS'
[patent_app_type] => utility
[patent_app_number] => 15/368574
[patent_app_country] => US
[patent_app_date] => 2016-12-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7514
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15368574
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/368574 | Intelligent task assignment and authorization systems and methods | Dec 2, 2016 | Issued |
Array
(
[id] => 12352929
[patent_doc_number] => 09953152
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-04-24
[patent_title] => Embedded authentication systems in an electronic device
[patent_app_type] => utility
[patent_app_number] => 15/357873
[patent_app_country] => US
[patent_app_date] => 2016-11-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 18
[patent_no_of_words] => 11286
[patent_no_of_claims] => 66
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 160
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15357873
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/357873 | Embedded authentication systems in an electronic device | Nov 20, 2016 | Issued |
Array
(
[id] => 11661191
[patent_doc_number] => 09674213
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-06-06
[patent_title] => 'Methods and systems for implementing a phishing assessment'
[patent_app_type] => utility
[patent_app_number] => 15/337054
[patent_app_country] => US
[patent_app_date] => 2016-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 15162
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 230
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15337054
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/337054 | Methods and systems for implementing a phishing assessment | Oct 27, 2016 | Issued |
Array
(
[id] => 11477020
[patent_doc_number] => 20170063803
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-03-02
[patent_title] => 'FIREWALL INTERFACE CONFIGURATION TO ENABLE BI-DIRECTIONAL VOIP TRAVERSAL COMMUNICATIONS'
[patent_app_type] => utility
[patent_app_number] => 15/334971
[patent_app_country] => US
[patent_app_date] => 2016-10-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6585
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15334971
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/334971 | Firewall interface configuration to enable bi-directional VoIP traversal communications | Oct 25, 2016 | Issued |
Array
(
[id] => 11629955
[patent_doc_number] => 20170140144
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-05-18
[patent_title] => 'SYSTEM AND METHOD FOR AUTHENTICATING A MOBILE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 15/331900
[patent_app_country] => US
[patent_app_date] => 2016-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 31
[patent_no_of_words] => 35214
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15331900
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/331900 | System and method for authenticating a mobile device | Oct 22, 2016 | Issued |
Array
(
[id] => 13726153
[patent_doc_number] => 20170374032
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-12-28
[patent_title] => Autonomic Protection of Critical Network Applications Using Deception Techniques
[patent_app_type] => utility
[patent_app_number] => 15/299433
[patent_app_country] => US
[patent_app_date] => 2016-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11610
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15299433
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/299433 | Autonomic Protection of Critical Network Applications Using Deception Techniques | Oct 19, 2016 | Abandoned |
Array
(
[id] => 11426041
[patent_doc_number] => 20170034187
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-02-02
[patent_title] => 'SYSTEM AND METHODS FOR ADAPTIVE MODEL GENERATION FOR DETECTING INTRUSION IN COMPUTER SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 15/291218
[patent_app_country] => US
[patent_app_date] => 2016-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 17787
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15291218
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/291218 | SYSTEM AND METHODS FOR ADAPTIVE MODEL GENERATION FOR DETECTING INTRUSION IN COMPUTER SYSTEMS | Oct 11, 2016 | Abandoned |
Array
(
[id] => 12599115
[patent_doc_number] => 20180091535
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2018-03-29
[patent_title] => SNAPSHOT OF A FORENSIC INVESTIGATION FOR ENTERPRISE THREAT DETECTION
[patent_app_type] => utility
[patent_app_number] => 15/274569
[patent_app_country] => US
[patent_app_date] => 2016-09-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 9033
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15274569
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/274569 | Snapshot of a forensic investigation for enterprise threat detection | Sep 22, 2016 | Issued |