Nevena Zecevic Sandhu
Examiner (ID: 17515)
Most Active Art Unit | 2474 |
Art Unit(s) | 2474 |
Total Applications | 194 |
Issued Applications | 100 |
Pending Applications | 57 |
Abandoned Applications | 37 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 11695460
[patent_doc_number] => 20170171177
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-06-15
[patent_title] => 'AUTHENTICATION VIA ITEM RECOGNITION'
[patent_app_type] => utility
[patent_app_number] => 14/967112
[patent_app_country] => US
[patent_app_date] => 2015-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5611
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14967112
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/967112 | Authentication via item recognition | Dec 10, 2015 | Issued |
Array
(
[id] => 11058538
[patent_doc_number] => 20160255500
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-09-01
[patent_title] => 'Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System'
[patent_app_type] => utility
[patent_app_number] => 14/952189
[patent_app_country] => US
[patent_app_date] => 2015-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3345
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14952189
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/952189 | Methods and Apparatuses Generating a Radio Base Station Key in a Cellular Radio System | Nov 24, 2015 | Abandoned |
Array
(
[id] => 14736471
[patent_doc_number] => 10387636
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-08-20
[patent_title] => Secure unlock of a device
[patent_app_type] => utility
[patent_app_number] => 14/887768
[patent_app_country] => US
[patent_app_date] => 2015-10-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11360
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 470
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14887768
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/887768 | Secure unlock of a device | Oct 19, 2015 | Issued |
Array
(
[id] => 10786529
[patent_doc_number] => 20160132684
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-12
[patent_title] => 'SECURE DATABASE BACKUP AND RECOVERY'
[patent_app_type] => utility
[patent_app_number] => 14/883905
[patent_app_country] => US
[patent_app_date] => 2015-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6859
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14883905
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/883905 | Secure database backup and recovery | Oct 14, 2015 | Issued |
Array
(
[id] => 11294768
[patent_doc_number] => 20160344700
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-11-24
[patent_title] => 'SYSTEM AND METHOD FOR RECEPTION AND TRANSMISSION OPTIMIZATION OF SECURED VIDEO, IMAGE, AUDIO, AND OTHER MEDIA TRAFFIC VIA PROXY'
[patent_app_type] => utility
[patent_app_number] => 14/882621
[patent_app_country] => US
[patent_app_date] => 2015-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8314
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14882621
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/882621 | SYSTEM AND METHOD FOR RECEPTION AND TRANSMISSION OPTIMIZATION OF SECURED VIDEO, IMAGE, AUDIO, AND OTHER MEDIA TRAFFIC VIA PROXY | Oct 13, 2015 | Abandoned |
Array
(
[id] => 10680640
[patent_doc_number] => 20160026785
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-28
[patent_title] => 'INTEGRATED PHYSICAL AND LOGICAL SECURITY MANAGEMENT VIA A PORTABLE DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/874742
[patent_app_country] => US
[patent_app_date] => 2015-10-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 10264
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14874742
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/874742 | INTEGRATED PHYSICAL AND LOGICAL SECURITY MANAGEMENT VIA A PORTABLE DEVICE | Oct 4, 2015 | Abandoned |
Array
(
[id] => 11240774
[patent_doc_number] => 09467435
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-10-11
[patent_title] => 'Electronic message threat protection system for authorized users'
[patent_app_type] => utility
[patent_app_number] => 14/855200
[patent_app_country] => US
[patent_app_date] => 2015-09-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 9233
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 431
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14855200
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/855200 | Electronic message threat protection system for authorized users | Sep 14, 2015 | Issued |
Array
(
[id] => 10732056
[patent_doc_number] => 20160078206
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-17
[patent_title] => 'TERMINAL DEVICE AND METHOD FOR CONTROLLING ACCESS TO SAME'
[patent_app_type] => utility
[patent_app_number] => 14/825319
[patent_app_country] => US
[patent_app_date] => 2015-08-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4475
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14825319
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/825319 | TERMINAL DEVICE AND METHOD FOR CONTROLLING ACCESS TO SAME | Aug 12, 2015 | Abandoned |
Array
(
[id] => 10658711
[patent_doc_number] => 20160004855
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-01-07
[patent_title] => 'LOGIN USING TWO-DIMENSIONAL CODE'
[patent_app_type] => utility
[patent_app_number] => 14/789791
[patent_app_country] => US
[patent_app_date] => 2015-07-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 11526
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14789791
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/789791 | LOGIN USING TWO-DIMENSIONAL CODE | Jun 30, 2015 | Abandoned |
Array
(
[id] => 13685641
[patent_doc_number] => 20160381557
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => CONTROLLING MOBILE DEVICE ACCESS WITH A PAIRED DEVICE
[patent_app_type] => utility
[patent_app_number] => 14/749678
[patent_app_country] => US
[patent_app_date] => 2015-06-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 4213
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -11
[patent_words_short_claim] => 2
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14749678
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/749678 | Controlling mobile device access with a paired device | Jun 24, 2015 | Issued |
Array
(
[id] => 10719454
[patent_doc_number] => 20160065600
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-03-03
[patent_title] => 'APPARATUS AND METHOD FOR AUTOMATICALLY DETECTING MALICIOUS LINK'
[patent_app_type] => utility
[patent_app_number] => 14/748396
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 8427
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748396
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748396 | APPARATUS AND METHOD FOR AUTOMATICALLY DETECTING MALICIOUS LINK | Jun 23, 2015 | Abandoned |
Array
(
[id] => 13684621
[patent_doc_number] => 20160381047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => Identifying and Assessing Malicious Resources
[patent_app_type] => utility
[patent_app_number] => 14/748493
[patent_app_country] => US
[patent_app_date] => 2015-06-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7563
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 137
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14748493
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/748493 | Identifying and assessing malicious resources | Jun 23, 2015 | Issued |
Array
(
[id] => 11754489
[patent_doc_number] => 09712520
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-07-18
[patent_title] => 'User authentication using client-side browse history'
[patent_app_type] => utility
[patent_app_number] => 14/747919
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 16353
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14747919
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/747919 | User authentication using client-side browse history | Jun 22, 2015 | Issued |
Array
(
[id] => 10403714
[patent_doc_number] => 20150288723
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'PROCESSING INFORMATION BASED ON POLICY INFORMATION OF A TARGET USER'
[patent_app_type] => utility
[patent_app_number] => 14/747018
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 9519
[patent_no_of_claims] => 1
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14747018
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/747018 | Processing information based on policy information of a target user | Jun 22, 2015 | Issued |
Array
(
[id] => 13684501
[patent_doc_number] => 20160380987
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-12-29
[patent_title] => PROTECTING SENSITIVE DATA IN A SECURITY AREA
[patent_app_type] => utility
[patent_app_number] => 14/747274
[patent_app_country] => US
[patent_app_date] => 2015-06-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5009
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 89
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14747274
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/747274 | Protecting sensitive data in a security area | Jun 22, 2015 | Issued |
Array
(
[id] => 10166434
[patent_doc_number] => 09197673
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2015-11-24
[patent_title] => 'System and method for reception and transmission optimization of secured video, image, audio, and other media traffic via proxy'
[patent_app_type] => utility
[patent_app_number] => 14/714960
[patent_app_country] => US
[patent_app_date] => 2015-05-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8261
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 293
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14714960
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/714960 | System and method for reception and transmission optimization of secured video, image, audio, and other media traffic via proxy | May 17, 2015 | Issued |
Array
(
[id] => 11425824
[patent_doc_number] => 20170033970
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2017-02-02
[patent_title] => 'MIGRATION OF FULL-DISK ENCRYPTED VIRTUALIZED STORAGE BETWEEN BLADE SERVERS'
[patent_app_type] => utility
[patent_app_number] => 14/697956
[patent_app_country] => US
[patent_app_date] => 2015-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6916
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14697956
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/697956 | MIGRATION OF FULL-DISK ENCRYPTED VIRTUALIZED STORAGE BETWEEN BLADE SERVERS | Apr 27, 2015 | Abandoned |
Array
(
[id] => 11425824
[patent_doc_number] => 20170033970
[patent_country] => US
[patent_kind] => A9
[patent_issue_date] => 2017-02-02
[patent_title] => 'MIGRATION OF FULL-DISK ENCRYPTED VIRTUALIZED STORAGE BETWEEN BLADE SERVERS'
[patent_app_type] => utility
[patent_app_number] => 14/697956
[patent_app_country] => US
[patent_app_date] => 2015-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6916
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14697956
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/697956 | MIGRATION OF FULL-DISK ENCRYPTED VIRTUALIZED STORAGE BETWEEN BLADE SERVERS | Apr 27, 2015 | Abandoned |
Array
(
[id] => 11391240
[patent_doc_number] => 09552486
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-01-24
[patent_title] => 'Systems and methods for protecting video content'
[patent_app_type] => utility
[patent_app_number] => 14/627273
[patent_app_country] => US
[patent_app_date] => 2015-02-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 17717
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14627273
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/627273 | Systems and methods for protecting video content | Feb 19, 2015 | Issued |
Array
(
[id] => 11015154
[patent_doc_number] => 20160212107
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-07-21
[patent_title] => 'TAPE DRIVE ENCRYPTION IN THE DATA PATH'
[patent_app_type] => utility
[patent_app_number] => 14/601479
[patent_app_country] => US
[patent_app_date] => 2015-01-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5902
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14601479
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/601479 | Tape drive encryption in the data path | Jan 20, 2015 | Issued |