
Nicholas D. Lucchesi
Examiner (ID: 390)
| Most Active Art Unit | 3772 |
| Art Unit(s) | 3732, 3772, 2899, 3763, 3764, 3303, 3616 |
| Total Applications | 2470 |
| Issued Applications | 1945 |
| Pending Applications | 237 |
| Abandoned Applications | 305 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 14331459
[patent_doc_number] => 10296750
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2019-05-21
[patent_title] => Robust data tagging
[patent_app_type] => utility
[patent_app_number] => 14/482680
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 14286
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 120
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482680
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482680 | Robust data tagging | Sep 9, 2014 | Issued |
Array
(
[id] => 11832805
[patent_doc_number] => 09729560
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-08-08
[patent_title] => 'Method and device for synchronizing network data flow detection status'
[patent_app_type] => utility
[patent_app_number] => 14/482210
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 17
[patent_no_of_words] => 21550
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 225
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14482210
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/482210 | Method and device for synchronizing network data flow detection status | Sep 9, 2014 | Issued |
Array
(
[id] => 15521647
[patent_doc_number] => 10567434
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-02-18
[patent_title] => Communication channel security enhancements
[patent_app_type] => utility
[patent_app_number] => 14/483071
[patent_app_country] => US
[patent_app_date] => 2014-09-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 16223
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14483071
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/483071 | Communication channel security enhancements | Sep 9, 2014 | Issued |
Array
(
[id] => 10315927
[patent_doc_number] => 20150200930
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-16
[patent_title] => 'METHOD AND APPARATUS FOR SECURING MOBILE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 14/480664
[patent_app_country] => US
[patent_app_date] => 2014-09-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14279
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14480664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/480664 | METHOD AND APPARATUS FOR SECURING MOBILE APPLICATIONS | Sep 8, 2014 | Abandoned |
Array
(
[id] => 10941880
[patent_doc_number] => 20140344901
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-20
[patent_title] => 'Method And System For Sharing A File'
[patent_app_type] => utility
[patent_app_number] => 14/449216
[patent_app_country] => US
[patent_app_date] => 2014-08-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4071
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14449216
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/449216 | Method And System For Sharing A File | Jul 31, 2014 | Abandoned |
Array
(
[id] => 9787688
[patent_doc_number] => 20140304508
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-10-09
[patent_title] => 'CONFIDENTIAL MESSAGE EXCHANGE USING BENIGN, CONTEXT-AWARE COVER MESSAGE GENERATION'
[patent_app_type] => utility
[patent_app_number] => 14/308612
[patent_app_country] => US
[patent_app_date] => 2014-06-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 8683
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14308612
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/308612 | Confidential message exchange using benign, context-aware cover message generation | Jun 17, 2014 | Issued |
Array
(
[id] => 10781614
[patent_doc_number] => 20160127770
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-05-05
[patent_title] => 'CONTENT PROVIDING ELECTRONIC DEVICE AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 14/294761
[patent_app_country] => US
[patent_app_date] => 2014-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6800
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14294761
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/294761 | CONTENT PROVIDING ELECTRONIC DEVICE AND METHOD | Jun 2, 2014 | Abandoned |
Array
(
[id] => 10464988
[patent_doc_number] => 20150350003
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'DYNAMIC ACCOUNT UPDATING'
[patent_app_type] => utility
[patent_app_number] => 14/291596
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 7567
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291596
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291596 | Dynamic account updating | May 29, 2014 | Issued |
Array
(
[id] => 10465219
[patent_doc_number] => 20150350234
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'MANIPULATING API REQUESTS TO INDICATE SOURCE COMPUTER APPLICATION TRUSTWORTHINESS'
[patent_app_type] => utility
[patent_app_number] => 14/291484
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 9425
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14291484
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/291484 | Manipulating API requests to indicate source computer application trustworthiness | May 29, 2014 | Issued |
Array
(
[id] => 10465185
[patent_doc_number] => 20150350200
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'BIOMETRIC FRAMEWORK ALLOWING INDEPENDENT APPLICATION CONTROL'
[patent_app_type] => utility
[patent_app_number] => 14/292287
[patent_app_country] => US
[patent_app_date] => 2014-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 12710
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14292287
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/292287 | Biometric framework allowing independent application control | May 29, 2014 | Issued |
Array
(
[id] => 10465879
[patent_doc_number] => 20150350894
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'Method and System for Establishing a Secure Communication Channel'
[patent_app_type] => utility
[patent_app_number] => 14/289692
[patent_app_country] => US
[patent_app_date] => 2014-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7192
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289692
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/289692 | Method and System for Establishing a Secure Communication Channel | May 28, 2014 | Abandoned |
Array
(
[id] => 10465169
[patent_doc_number] => 20150350185
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-03
[patent_title] => 'SYSTEM AND METHOD USING SINGLE ENTRY PASSKEY FOR PAIRING MULTIPLE PERIPHERAL DEVICES'
[patent_app_type] => utility
[patent_app_number] => 14/289170
[patent_app_country] => US
[patent_app_date] => 2014-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5008
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289170
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/289170 | SYSTEM AND METHOD USING SINGLE ENTRY PASSKEY FOR PAIRING MULTIPLE PERIPHERAL DEVICES | May 27, 2014 | Abandoned |
Array
(
[id] => 11917390
[patent_doc_number] => 09785577
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-10-10
[patent_title] => 'Kernel key handling'
[patent_app_type] => utility
[patent_app_number] => 14/289273
[patent_app_country] => US
[patent_app_date] => 2014-05-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4634
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14289273
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/289273 | Kernel key handling | May 27, 2014 | Issued |
Array
(
[id] => 10456369
[patent_doc_number] => 20150341383
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-26
[patent_title] => 'PROTECT APPLICATIONS FROM SESSION STEALING/HIJACKING ATTACKS BY TRACKING AND BLOCKING ANOMALIES IN END POINT CHARACTERISTICS THROUGHOUT A USER SESSION'
[patent_app_type] => utility
[patent_app_number] => 14/286610
[patent_app_country] => US
[patent_app_date] => 2014-05-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 40910
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14286610
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/286610 | Protect applications from session stealing/hijacking attacks by tracking and blocking anomalies in end point characteristics throughout a user session | May 22, 2014 | Issued |
Array
(
[id] => 10447046
[patent_doc_number] => 20150332061
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-19
[patent_title] => 'PREFERENCE-BASED MANAGEMENT INTERFACE FOR USE OF PORTABLE DEVICE APPLICATIONS AND ASSOCIATED METHOD OF USE THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/280303
[patent_app_country] => US
[patent_app_date] => 2014-05-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4903
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14280303
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/280303 | Preference-based management interface for use of portable device applications and associated method of use thereof | May 15, 2014 | Issued |
Array
(
[id] => 10446029
[patent_doc_number] => 20150331043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-19
[patent_title] => 'SYSTEM-ON-CHIP SECURE DEBUG'
[patent_app_type] => utility
[patent_app_number] => 14/279007
[patent_app_country] => US
[patent_app_date] => 2014-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12363
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14279007
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/279007 | SYSTEM-ON-CHIP SECURE DEBUG | May 14, 2014 | Abandoned |
Array
(
[id] => 14918597
[patent_doc_number] => 10430619
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-01
[patent_title] => Management of digital copies of registrations using mobile devices
[patent_app_type] => utility
[patent_app_number] => 14/278552
[patent_app_country] => US
[patent_app_date] => 2014-05-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9770
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 171
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14278552
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/278552 | Management of digital copies of registrations using mobile devices | May 14, 2014 | Issued |
Array
(
[id] => 10439540
[patent_doc_number] => 20150324552
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-11-12
[patent_title] => 'Share Restriction for Media Items'
[patent_app_type] => utility
[patent_app_number] => 14/275112
[patent_app_country] => US
[patent_app_date] => 2014-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 15740
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14275112
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/275112 | Share Restriction for Media Items | May 11, 2014 | Abandoned |
Array
(
[id] => 15013439
[patent_doc_number] => 10452869
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-10-22
[patent_title] => Systems and methods for processing and verifying data using signatures
[patent_app_type] => utility
[patent_app_number] => 14/271866
[patent_app_country] => US
[patent_app_date] => 2014-05-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 6142
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14271866
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/271866 | Systems and methods for processing and verifying data using signatures | May 6, 2014 | Issued |
Array
(
[id] => 10403509
[patent_doc_number] => 20150288518
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-10-08
[patent_title] => 'ALGORITHM-AGNOSTIC APPROACH FOR SYSTEMATICALLY HARDENING ENCRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/247959
[patent_app_country] => US
[patent_app_date] => 2014-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 8604
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14247959
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/247959 | ALGORITHM-AGNOSTIC APPROACH FOR SYSTEMATICALLY HARDENING ENCRYPTION | Apr 7, 2014 | Abandoned |