
Nancy Bitar
Examiner (ID: 11024, Phone: (571)270-1041 , Office: P/2669 )
| Most Active Art Unit | 2664 |
| Art Unit(s) | 2664, 2669, 2624 |
| Total Applications | 1250 |
| Issued Applications | 1011 |
| Pending Applications | 67 |
| Abandoned Applications | 193 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9410521
[patent_doc_number] => 20140101773
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-10
[patent_title] => 'SYSTEM, A METHOD AND A COMPUTER READABLE MEDIUM FOR TRANSMITTING AN ELECTRONIC FILE'
[patent_app_type] => utility
[patent_app_number] => 14/042732
[patent_app_country] => US
[patent_app_date] => 2013-10-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 10069
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042732
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042732 | System, a method and a computer readable medium for transmitting an electronic file | Sep 30, 2013 | Issued |
Array
(
[id] => 10210977
[patent_doc_number] => 20150095968
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'Flexible Role Based Authorization Model'
[patent_app_type] => utility
[patent_app_number] => 14/041203
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9201
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041203
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041203 | Flexible role based authorization model | Sep 29, 2013 | Issued |
Array
(
[id] => 10501704
[patent_doc_number] => 09230105
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-05
[patent_title] => 'Detecting malicious tampering of web forms'
[patent_app_type] => utility
[patent_app_number] => 14/041661
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5046
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 317
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041661
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041661 | Detecting malicious tampering of web forms | Sep 29, 2013 | Issued |
Array
(
[id] => 9745799
[patent_doc_number] => 20140281518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'MULTI-TIER FILE RESTORATION'
[patent_app_type] => utility
[patent_app_number] => 14/042106
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 41752
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042106
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042106 | MULTI-TIER FILE RESTORATION | Sep 29, 2013 | Abandoned |
Array
(
[id] => 10210989
[patent_doc_number] => 20150095981
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'BLOCKING VIA AN UNSOLVABLE CAPTCHA'
[patent_app_type] => utility
[patent_app_number] => 14/042184
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 6861
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042184
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042184 | Blocking via an unsolvable CAPTCHA | Sep 29, 2013 | Issued |
Array
(
[id] => 11228244
[patent_doc_number] => 09455972
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-27
[patent_title] => 'Provisioning a mobile device with a security application on the fly'
[patent_app_type] => utility
[patent_app_number] => 14/041108
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5450
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 127
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041108
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041108 | Provisioning a mobile device with a security application on the fly | Sep 29, 2013 | Issued |
Array
(
[id] => 10612376
[patent_doc_number] => 09332433
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-03
[patent_title] => 'Distributing access and identification tokens in a mobile environment'
[patent_app_type] => utility
[patent_app_number] => 14/041125
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6708
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 387
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041125
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041125 | Distributing access and identification tokens in a mobile environment | Sep 29, 2013 | Issued |
Array
(
[id] => 9745826
[patent_doc_number] => 20140281545
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'MULTI-LAYER EMBEDDED ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/042216
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 41752
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042216
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042216 | MULTI-LAYER EMBEDDED ENCRYPTION | Sep 29, 2013 | Abandoned |
Array
(
[id] => 9745800
[patent_doc_number] => 20140281519
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'ENCRYPTED FILE BACKUP'
[patent_app_type] => utility
[patent_app_number] => 14/042173
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 41753
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042173
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042173 | ENCRYPTED FILE BACKUP | Sep 29, 2013 | Abandoned |
Array
(
[id] => 11782792
[patent_doc_number] => 09392018
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-12
[patent_title] => 'Limiting the efficacy of a denial of service attack by increasing client resource demands'
[patent_app_type] => utility
[patent_app_number] => 14/042221
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8737
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 195
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042221
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042221 | Limiting the efficacy of a denial of service attack by increasing client resource demands | Sep 29, 2013 | Issued |
Array
(
[id] => 12251096
[patent_doc_number] => 09923892
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-03-20
[patent_title] => 'Enhanced automatic response culling with signature generation and filtering'
[patent_app_type] => utility
[patent_app_number] => 14/041699
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 6
[patent_no_of_words] => 3701
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 229
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041699
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041699 | Enhanced automatic response culling with signature generation and filtering | Sep 29, 2013 | Issued |
Array
(
[id] => 10210657
[patent_doc_number] => 20150095649
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-02
[patent_title] => 'COMMUNITY OF INTEREST-BASED SECURED COMMUNICATIONS OVER IPSEC'
[patent_app_type] => utility
[patent_app_number] => 14/042212
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 12995
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042212
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042212 | Community of interest-based secured communications over IPsec | Sep 29, 2013 | Issued |
Array
(
[id] => 11361174
[patent_doc_number] => 09537845
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-01-03
[patent_title] => 'Determining authenticity based on indicators derived from information relating to historical events'
[patent_app_type] => utility
[patent_app_number] => 14/042645
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 5668
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 256
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14042645
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/042645 | Determining authenticity based on indicators derived from information relating to historical events | Sep 29, 2013 | Issued |
Array
(
[id] => 10610224
[patent_doc_number] => 09330258
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-05-03
[patent_title] => 'Systems and methods for identifying uniform resource locators that link to potentially malicious resources'
[patent_app_type] => utility
[patent_app_number] => 14/041826
[patent_app_country] => US
[patent_app_date] => 2013-09-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12751
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 340
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14041826
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/041826 | Systems and methods for identifying uniform resource locators that link to potentially malicious resources | Sep 29, 2013 | Issued |
Array
(
[id] => 12480300
[patent_doc_number] => 09992031
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-06-05
[patent_title] => Dark bits to reduce physically unclonable function error rates
[patent_app_type] => utility
[patent_app_number] => 14/040337
[patent_app_country] => US
[patent_app_date] => 2013-09-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 3532
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14040337
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/040337 | Dark bits to reduce physically unclonable function error rates | Sep 26, 2013 | Issued |
Array
(
[id] => 9264823
[patent_doc_number] => 20130346752
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-26
[patent_title] => 'SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/974893
[patent_app_country] => US
[patent_app_date] => 2013-08-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 10545
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13974893
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/974893 | SECURE, AUDITABLE FILE EXCHANGE SYSTEM AND METHOD | Aug 22, 2013 | Abandoned |
Array
(
[id] => 10293479
[patent_doc_number] => 20150178479
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-25
[patent_title] => 'Transmission of a Digital Content Between a Source Terminal and a Recipient Terminal'
[patent_app_type] => utility
[patent_app_number] => 14/415800
[patent_app_country] => US
[patent_app_date] => 2013-07-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7387
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14415800
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/415800 | Transmission of a Digital Content Between a Source Terminal and a Recipient Terminal | Jul 15, 2013 | Abandoned |
Array
(
[id] => 10173142
[patent_doc_number] => 09203862
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-12-01
[patent_title] => 'Centralized storage and management of malware manifests'
[patent_app_type] => utility
[patent_app_number] => 13/932465
[patent_app_country] => US
[patent_app_date] => 2013-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 23786
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13932465
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/932465 | Centralized storage and management of malware manifests | Jun 30, 2013 | Issued |
Array
(
[id] => 11724203
[patent_doc_number] => 09697058
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-07-04
[patent_title] => 'Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor'
[patent_app_type] => utility
[patent_app_number] => 13/902982
[patent_app_country] => US
[patent_app_date] => 2013-06-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 8073
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 248
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13902982
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/902982 | Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor | Jun 26, 2013 | Issued |
Array
(
[id] => 12115768
[patent_doc_number] => 09871770
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-16
[patent_title] => 'Secure data parser method and system'
[patent_app_type] => utility
[patent_app_number] => 13/915570
[patent_app_country] => US
[patent_app_date] => 2013-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 36
[patent_figures_cnt] => 36
[patent_no_of_words] => 44574
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13915570
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/915570 | Secure data parser method and system | Jun 10, 2013 | Issued |