Nevena Zecevic Sandhu
Examiner (ID: 17515)
Most Active Art Unit | 2474 |
Art Unit(s) | 2474 |
Total Applications | 194 |
Issued Applications | 100 |
Pending Applications | 57 |
Abandoned Applications | 37 |
Applications
Application number | Title of the application | Filing Date | Status |
---|---|---|---|
Array
(
[id] => 1100451
[patent_doc_number] => 06823462
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-11-23
[patent_title] => 'Virtual private network with multiple tunnels associated with one group name'
[patent_app_type] => B1
[patent_app_number] => 09/657122
[patent_app_country] => US
[patent_app_date] => 2000-09-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 4842
[patent_no_of_claims] => 66
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 141
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/823/06823462.pdf
[firstpage_image] =>[orig_patent_app_number] => 09657122
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/657122 | Virtual private network with multiple tunnels associated with one group name | Sep 6, 2000 | Issued |
Array
(
[id] => 519929
[patent_doc_number] => 07203962
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-04-10
[patent_title] => 'System and method for using timestamps to detect attacks'
[patent_app_type] => utility
[patent_app_number] => 09/654347
[patent_app_country] => US
[patent_app_date] => 2000-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 23552
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 100
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/203/07203962.pdf
[firstpage_image] =>[orig_patent_app_number] => 09654347
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/654347 | System and method for using timestamps to detect attacks | Aug 29, 2000 | Issued |
Array
(
[id] => 1097441
[patent_doc_number] => 06826697
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-11-30
[patent_title] => 'System and method for detecting buffer overflow attacks'
[patent_app_type] => B1
[patent_app_number] => 09/651306
[patent_app_country] => US
[patent_app_date] => 2000-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 23498
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/826/06826697.pdf
[firstpage_image] =>[orig_patent_app_number] => 09651306
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/651306 | System and method for detecting buffer overflow attacks | Aug 29, 2000 | Issued |
Array
(
[id] => 706830
[patent_doc_number] => 07065657
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-06-20
[patent_title] => 'Extensible intrusion detection system'
[patent_app_type] => utility
[patent_app_number] => 09/651303
[patent_app_country] => US
[patent_app_date] => 2000-08-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 12
[patent_no_of_words] => 23569
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 189
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/065/07065657.pdf
[firstpage_image] =>[orig_patent_app_number] => 09651303
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/651303 | Extensible intrusion detection system | Aug 29, 2000 | Issued |
Array
(
[id] => 467708
[patent_doc_number] => 07239702
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-07-03
[patent_title] => 'Information recording/reproducing device'
[patent_app_type] => utility
[patent_app_number] => 09/807703
[patent_app_country] => US
[patent_app_date] => 2000-08-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 10390
[patent_no_of_claims] => 81
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/239/07239702.pdf
[firstpage_image] =>[orig_patent_app_number] => 09807703
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/807703 | Information recording/reproducing device | Aug 15, 2000 | Issued |
Array
(
[id] => 1181251
[patent_doc_number] => 06754819
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-06-22
[patent_title] => 'Method and system for providing cryptographic services in a distributed application'
[patent_app_type] => B1
[patent_app_number] => 09/610740
[patent_app_country] => US
[patent_app_date] => 2000-07-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 8677
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/754/06754819.pdf
[firstpage_image] =>[orig_patent_app_number] => 09610740
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/610740 | Method and system for providing cryptographic services in a distributed application | Jul 5, 2000 | Issued |
Array
(
[id] => 438709
[patent_doc_number] => 07263722
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2007-08-28
[patent_title] => 'Obfuscation of executable code'
[patent_app_type] => utility
[patent_app_number] => 10/019828
[patent_app_country] => US
[patent_app_date] => 2000-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 4857
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 41
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/263/07263722.pdf
[firstpage_image] =>[orig_patent_app_number] => 10019828
[rel_patent_id] =>[rel_patent_doc_number] =>) 10/019828 | Obfuscation of executable code | May 11, 2000 | Issued |
Array
(
[id] => 1109847
[patent_doc_number] => 06813709
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-11-02
[patent_title] => 'Method and apparatus for recorded digital data protection via media volume'
[patent_app_type] => B1
[patent_app_number] => 09/534181
[patent_app_country] => US
[patent_app_date] => 2000-03-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 4602
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/813/06813709.pdf
[firstpage_image] =>[orig_patent_app_number] => 09534181
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/534181 | Method and apparatus for recorded digital data protection via media volume | Mar 23, 2000 | Issued |
Array
(
[id] => 981684
[patent_doc_number] => 06931534
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-08-16
[patent_title] => 'Method and a device for encryption of images'
[patent_app_type] => utility
[patent_app_number] => 09/443813
[patent_app_country] => US
[patent_app_date] => 1999-11-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 3635
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 103
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/931/06931534.pdf
[firstpage_image] =>[orig_patent_app_number] => 09443813
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/443813 | Method and a device for encryption of images | Nov 18, 1999 | Issued |
Array
(
[id] => 1186394
[patent_doc_number] => 06742114
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-05-25
[patent_title] => 'Deputization in a distributed computing system'
[patent_app_type] => B1
[patent_app_number] => 09/442521
[patent_app_country] => US
[patent_app_date] => 1999-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 8
[patent_no_of_words] => 7601
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/742/06742114.pdf
[firstpage_image] =>[orig_patent_app_number] => 09442521
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/442521 | Deputization in a distributed computing system | Nov 17, 1999 | Issued |
Array
(
[id] => 676790
[patent_doc_number] => 07093295
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-08-15
[patent_title] => 'Method and device for protecting digital data by double re-encryption'
[patent_app_type] => utility
[patent_app_number] => 09/806510
[patent_app_country] => US
[patent_app_date] => 1999-10-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 14
[patent_no_of_words] => 16220
[patent_no_of_claims] => 92
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/093/07093295.pdf
[firstpage_image] =>[orig_patent_app_number] => 09806510
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/806510 | Method and device for protecting digital data by double re-encryption | Oct 14, 1999 | Issued |
Array
(
[id] => 1186702
[patent_doc_number] => 06738909
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-05-18
[patent_title] => 'Method and apparatus for automatic configuration for internet protocol security tunnels in a distributed data processing system'
[patent_app_type] => B1
[patent_app_number] => 09/389199
[patent_app_country] => US
[patent_app_date] => 1999-09-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 11
[patent_no_of_words] => 5915
[patent_no_of_claims] => 27
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/738/06738909.pdf
[firstpage_image] =>[orig_patent_app_number] => 09389199
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/389199 | Method and apparatus for automatic configuration for internet protocol security tunnels in a distributed data processing system | Sep 1, 1999 | Issued |
Array
(
[id] => 791555
[patent_doc_number] => 06985582
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-01-10
[patent_title] => 'Encryption/decryption unit and storage medium'
[patent_app_type] => utility
[patent_app_number] => 09/388388
[patent_app_country] => US
[patent_app_date] => 1999-09-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 12
[patent_no_of_words] => 9075
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 285
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/985/06985582.pdf
[firstpage_image] =>[orig_patent_app_number] => 09388388
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/388388 | Encryption/decryption unit and storage medium | Aug 31, 1999 | Issued |
Array
(
[id] => 1177763
[patent_doc_number] => 06760844
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-07-06
[patent_title] => 'Secure transactions sessions'
[patent_app_type] => B1
[patent_app_number] => 09/365594
[patent_app_country] => US
[patent_app_date] => 1999-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5008
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/760/06760844.pdf
[firstpage_image] =>[orig_patent_app_number] => 09365594
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/365594 | Secure transactions sessions | Jul 29, 1999 | Issued |
09/360530 | SYSTEMS AND METHODS FOR INTEGRATING ACCESS CONTROL WITH A NAMESPACE | Jul 25, 1999 | Abandoned |
Array
(
[id] => 1249836
[patent_doc_number] => 06674860
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-01-06
[patent_title] => 'Method and arrangement for managing a service in a mobile communications system'
[patent_app_type] => B1
[patent_app_number] => 09/354187
[patent_app_country] => US
[patent_app_date] => 1999-07-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 10
[patent_no_of_words] => 5372
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 57
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/674/06674860.pdf
[firstpage_image] =>[orig_patent_app_number] => 09354187
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/354187 | Method and arrangement for managing a service in a mobile communications system | Jul 14, 1999 | Issued |
Array
(
[id] => 932280
[patent_doc_number] => 06980660
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-12-27
[patent_title] => 'Method and apparatus for efficiently initializing mobile wireless devices'
[patent_app_type] => utility
[patent_app_number] => 09/316804
[patent_app_country] => US
[patent_app_date] => 1999-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 7616
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 149
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/980/06980660.pdf
[firstpage_image] =>[orig_patent_app_number] => 09316804
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/316804 | Method and apparatus for efficiently initializing mobile wireless devices | May 20, 1999 | Issued |
Array
(
[id] => 1161809
[patent_doc_number] => 06775778
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2004-08-10
[patent_title] => 'Secure computing device having boot read only memory verification of program code'
[patent_app_type] => B1
[patent_app_number] => 09/314398
[patent_app_country] => US
[patent_app_date] => 1999-05-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 7784
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 187
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/775/06775778.pdf
[firstpage_image] =>[orig_patent_app_number] => 09314398
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/314398 | Secure computing device having boot read only memory verification of program code | May 18, 1999 | Issued |
Array
(
[id] => 791556
[patent_doc_number] => 06985583
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2006-01-10
[patent_title] => 'System and method for authentication seed distribution'
[patent_app_type] => utility
[patent_app_number] => 09/304775
[patent_app_country] => US
[patent_app_date] => 1999-05-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7321
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/985/06985583.pdf
[firstpage_image] =>[orig_patent_app_number] => 09304775
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/304775 | System and method for authentication seed distribution | May 3, 1999 | Issued |
Array
(
[id] => 1075169
[patent_doc_number] => 06839837
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2005-01-04
[patent_title] => 'Cryptosystem key updating system and method for preventing illegal use of software'
[patent_app_type] => utility
[patent_app_number] => 09/303561
[patent_app_country] => US
[patent_app_date] => 1999-05-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3434
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 183
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/839/06839837.pdf
[firstpage_image] =>[orig_patent_app_number] => 09303561
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/303561 | Cryptosystem key updating system and method for preventing illegal use of software | May 2, 1999 | Issued |