
Narciso F. Victoria
Examiner (ID: 1597, Phone: (571)270-7904 , Office: P/2498 )
| Most Active Art Unit | 2438 |
| Art Unit(s) | 2438, 2498 |
| Total Applications | 250 |
| Issued Applications | 196 |
| Pending Applications | 0 |
| Abandoned Applications | 59 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 10236536
[patent_doc_number] => 20150121530
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-30
[patent_title] => 'System and Method for Sharing Files Between a Removable Device and a Target System'
[patent_app_type] => utility
[patent_app_number] => 14/067092
[patent_app_country] => US
[patent_app_date] => 2013-10-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 4551
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14067092
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/067092 | System and Method for Sharing Files Between a Removable Device and a Target System | Oct 29, 2013 | Abandoned |
Array
(
[id] => 10519819
[patent_doc_number] => 09246878
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-01-26
[patent_title] => 'Methods and systems for routing packets in a VPN-client-to-VPN-client connection via an SSL/VPN network appliance'
[patent_app_type] => utility
[patent_app_number] => 14/045922
[patent_app_country] => US
[patent_app_date] => 2013-10-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 18833
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 186
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14045922
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/045922 | Methods and systems for routing packets in a VPN-client-to-VPN-client connection via an SSL/VPN network appliance | Oct 3, 2013 | Issued |
Array
(
[id] => 9424520
[patent_doc_number] => 20140109171
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-04-17
[patent_title] => 'Providing Virtualized Private Network tunnels'
[patent_app_type] => utility
[patent_app_number] => 14/027929
[patent_app_country] => US
[patent_app_date] => 2013-09-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 26163
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14027929
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/027929 | Providing Virtualized Private Network tunnels | Sep 15, 2013 | Abandoned |
Array
(
[id] => 10146485
[patent_doc_number] => 09179309
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-03
[patent_title] => 'Security mode configuration procedures in wireless devices'
[patent_app_type] => utility
[patent_app_number] => 14/026833
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8082
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 259
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026833
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026833 | Security mode configuration procedures in wireless devices | Sep 12, 2013 | Issued |
Array
(
[id] => 9934228
[patent_doc_number] => 20150082420
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'Security Certificates For System-On-Chip Security'
[patent_app_type] => utility
[patent_app_number] => 14/026804
[patent_app_country] => US
[patent_app_date] => 2013-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8871
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14026804
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/026804 | Security certificates for system-on-chip security | Sep 12, 2013 | Issued |
Array
(
[id] => 11553205
[patent_doc_number] => 09622081
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-04-11
[patent_title] => 'Systems and methods for evaluating reputations of wireless networks'
[patent_app_type] => utility
[patent_app_number] => 14/025730
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 10959
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 226
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025730
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025730 | Systems and methods for evaluating reputations of wireless networks | Sep 11, 2013 | Issued |
Array
(
[id] => 11195308
[patent_doc_number] => 09426132
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-08-23
[patent_title] => 'Methods and apparatus for rules-based multi-factor verification'
[patent_app_type] => utility
[patent_app_number] => 14/025377
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 8435
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 304
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025377
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025377 | Methods and apparatus for rules-based multi-factor verification | Sep 11, 2013 | Issued |
Array
(
[id] => 9224993
[patent_doc_number] => 20140019768
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-01-16
[patent_title] => 'System and Method for Shunting Alarms Using Identifying Tokens'
[patent_app_type] => utility
[patent_app_number] => 14/025820
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 23145
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025820
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025820 | System and Method for Shunting Alarms Using Identifying Tokens | Sep 11, 2013 | Abandoned |
Array
(
[id] => 11577939
[patent_doc_number] => 09633203
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-25
[patent_title] => 'Spam notification device'
[patent_app_type] => utility
[patent_app_number] => 14/024938
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9184
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 219
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14024938
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/024938 | Spam notification device | Sep 11, 2013 | Issued |
Array
(
[id] => 12041417
[patent_doc_number] => 09819661
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-14
[patent_title] => 'Method of authorizing an operation to be performed on a targeted computing device'
[patent_app_type] => utility
[patent_app_number] => 14/025560
[patent_app_country] => US
[patent_app_date] => 2013-09-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 9736
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14025560
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/025560 | Method of authorizing an operation to be performed on a targeted computing device | Sep 11, 2013 | Issued |
Array
(
[id] => 11616601
[patent_doc_number] => 09654474
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-05-16
[patent_title] => 'Methods and systems for network-based management of application security'
[patent_app_type] => utility
[patent_app_number] => 14/024542
[patent_app_country] => US
[patent_app_date] => 2013-09-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 8507
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 26
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14024542
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/024542 | Methods and systems for network-based management of application security | Sep 10, 2013 | Issued |
Array
(
[id] => 9193682
[patent_doc_number] => 20130332997
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-12
[patent_title] => 'COMPUTERIZED SYSTEM AND METHOD FOR DEPLOYMENT OF MANAGEMENT TUNNELS'
[patent_app_type] => utility
[patent_app_number] => 13/965316
[patent_app_country] => US
[patent_app_date] => 2013-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5996
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13965316
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/965316 | Computerized system and method for deployment of management tunnels | Aug 12, 2013 | Issued |
Array
(
[id] => 11912119
[patent_doc_number] => 09780951
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-03
[patent_title] => 'Prevention of forgery of web requests to a server'
[patent_app_type] => utility
[patent_app_number] => 13/931120
[patent_app_country] => US
[patent_app_date] => 2013-06-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 5314
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13931120
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/931120 | Prevention of forgery of web requests to a server | Jun 27, 2013 | Issued |
Array
(
[id] => 9080613
[patent_doc_number] => 20130266143
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'METHOD AND DEVICE FOR SYNCHRONIZING UPLINK CIPHERING PARAMETER IN UNACKNOWLEDGED MODE'
[patent_app_type] => utility
[patent_app_number] => 13/908276
[patent_app_country] => US
[patent_app_date] => 2013-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 13977
[patent_no_of_claims] => 41
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13908276
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/908276 | Method and device for synchronizing uplink ciphering parameter in unacknowledged mode | Jun 2, 2013 | Issued |
Array
(
[id] => 9180632
[patent_doc_number] => 20130322617
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-05
[patent_title] => 'PHYSICALLY UNCLONABLE FUNCTIONS BASED ON NON-LINEARITY OF SUB-THRESHOLD OPERATION'
[patent_app_type] => utility
[patent_app_number] => 13/908348
[patent_app_country] => US
[patent_app_date] => 2013-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6545
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13908348
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/908348 | Physically unclonable functions based on non-linearity of sub-threshold operation | Jun 2, 2013 | Issued |
Array
(
[id] => 8992186
[patent_doc_number] => 20130219467
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-08-22
[patent_title] => 'NETWORK AUTHENTICATION METHOD, METHOD FOR CLIENT TO REQUEST AUTHENTICATION, CLIENT, AND DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/856141
[patent_app_country] => US
[patent_app_date] => 2013-04-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6558
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13856141
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/856141 | Network authentication method, method for client to request authentication, client, and device | Apr 2, 2013 | Issued |
Array
(
[id] => 12460281
[patent_doc_number] => 09985969
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-05-29
[patent_title] => Controlling use of computing-related resources by multiple independent parties
[patent_app_type] => utility
[patent_app_number] => 13/853926
[patent_app_country] => US
[patent_app_date] => 2013-03-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 15660
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13853926
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/853926 | Controlling use of computing-related resources by multiple independent parties | Mar 28, 2013 | Issued |
Array
(
[id] => 9747150
[patent_doc_number] => 20140282869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-09-18
[patent_title] => 'CERTIFICATE BASED PROFILE CONFIRMATION'
[patent_app_type] => utility
[patent_app_number] => 13/835542
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 8931
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13835542
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/835542 | Certificate based profile confirmation | Mar 14, 2013 | Issued |
Array
(
[id] => 12373629
[patent_doc_number] => 09959429
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-05-01
[patent_title] => Asymmetrically masked multiplication
[patent_app_type] => utility
[patent_app_number] => 13/835402
[patent_app_country] => US
[patent_app_date] => 2013-03-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 26
[patent_no_of_words] => 25624
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13835402
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/835402 | Asymmetrically masked multiplication | Mar 14, 2013 | Issued |
Array
(
[id] => 9688693
[patent_doc_number] => 20140245459
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-08-28
[patent_title] => 'SYSTEMS, METHODS AND APPARATUSES FOR BROKERING DATA BETWEEN WIRELESS DEVICES, SERVERS AND DATA RENDERING DEVICES'
[patent_app_type] => utility
[patent_app_number] => 13/777302
[patent_app_country] => US
[patent_app_date] => 2013-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7124
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13777302
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/777302 | SYSTEMS, METHODS AND APPARATUSES FOR BROKERING DATA BETWEEN WIRELESS DEVICES, SERVERS AND DATA RENDERING DEVICES | Feb 25, 2013 | Abandoned |