
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15735661
[patent_doc_number] => 10616275
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-04-07
[patent_title] => Systems and methods for situational localization of AIDA
[patent_app_type] => utility
[patent_app_number] => 16/502294
[patent_app_country] => US
[patent_app_date] => 2019-07-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 33318
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 85
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16502294
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/502294 | Systems and methods for situational localization of AIDA | Jul 2, 2019 | Issued |
Array
(
[id] => 18305213
[patent_doc_number] => 11627133
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-04-11
[patent_title] => Selectively restricting communications from third party applications/devices to electronic devices
[patent_app_type] => utility
[patent_app_number] => 16/436061
[patent_app_country] => US
[patent_app_date] => 2019-06-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 22
[patent_no_of_words] => 26137
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 108
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16436061
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/436061 | Selectively restricting communications from third party applications/devices to electronic devices | Jun 9, 2019 | Issued |
Array
(
[id] => 14877219
[patent_doc_number] => 20190288851
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-19
[patent_title] => Authentication Mechanism for 5G Technologies
[patent_app_type] => utility
[patent_app_number] => 16/433706
[patent_app_country] => US
[patent_app_date] => 2019-06-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10972
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16433706
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/433706 | Authentication Mechanism for 5G Technologies | Jun 5, 2019 | Abandoned |
Array
(
[id] => 14845287
[patent_doc_number] => 20190281044
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-09-12
[patent_title] => SECURELY SHARING CONFIDENTIAL INFORMATION IN A DOCUMENT
[patent_app_type] => utility
[patent_app_number] => 16/426664
[patent_app_country] => US
[patent_app_date] => 2019-05-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 7522
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -12
[patent_words_short_claim] => 315
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16426664
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/426664 | Securely sharing confidential information in a document | May 29, 2019 | Issued |
Array
(
[id] => 16535492
[patent_doc_number] => 10878093
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-12-29
[patent_title] => Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
[patent_app_type] => utility
[patent_app_number] => 16/425115
[patent_app_country] => US
[patent_app_date] => 2019-05-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9067
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 106
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16425115
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/425115 | Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning | May 28, 2019 | Issued |
Array
(
[id] => 16418789
[patent_doc_number] => 10826702
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-11-03
[patent_title] => Secure authentication of user and mobile device
[patent_app_type] => utility
[patent_app_number] => 16/419431
[patent_app_country] => US
[patent_app_date] => 2019-05-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 10335
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16419431
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/419431 | Secure authentication of user and mobile device | May 21, 2019 | Issued |
Array
(
[id] => 16049399
[patent_doc_number] => 10686592
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2020-06-16
[patent_title] => System and method to provide a secure communication of information
[patent_app_type] => utility
[patent_app_number] => 16/418888
[patent_app_country] => US
[patent_app_date] => 2019-05-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6589
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 184
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16418888
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/418888 | System and method to provide a secure communication of information | May 20, 2019 | Issued |
Array
(
[id] => 19184905
[patent_doc_number] => 11991519
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-05-21
[patent_title] => Communication method, communication system, authentication apparatus and user terminal device
[patent_app_type] => utility
[patent_app_number] => 17/059107
[patent_app_country] => US
[patent_app_date] => 2019-05-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 11265
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17059107
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/059107 | Communication method, communication system, authentication apparatus and user terminal device | May 16, 2019 | Issued |
Array
(
[id] => 16630618
[patent_doc_number] => 20210049271
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => SYSTEMS AND METHODS FOR DETECTING UNAUTHORIZED FILE ACCESS
[patent_app_type] => utility
[patent_app_number] => 17/051166
[patent_app_country] => US
[patent_app_date] => 2019-05-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5296
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17051166
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/051166 | SYSTEMS AND METHODS FOR DETECTING UNAUTHORIZED FILE ACCESS | May 1, 2019 | Abandoned |
Array
(
[id] => 16943162
[patent_doc_number] => 11055405
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-07-06
[patent_title] => Anomaly event detection using frequent patterns
[patent_app_type] => utility
[patent_app_number] => 16/399734
[patent_app_country] => US
[patent_app_date] => 2019-04-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 19
[patent_no_of_words] => 27202
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 201
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16399734
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/399734 | Anomaly event detection using frequent patterns | Apr 29, 2019 | Issued |
Array
(
[id] => 18892444
[patent_doc_number] => 11871233
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-01-09
[patent_title] => System and method for proximity detection with single-antenna device
[patent_app_type] => utility
[patent_app_number] => 17/050764
[patent_app_country] => US
[patent_app_date] => 2019-04-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 9716
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 68
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17050764
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/050764 | System and method for proximity detection with single-antenna device | Apr 25, 2019 | Issued |
Array
(
[id] => 15701711
[patent_doc_number] => 10607036
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-03-31
[patent_title] => Program execution device
[patent_app_type] => utility
[patent_app_number] => 16/393313
[patent_app_country] => US
[patent_app_date] => 2019-04-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 19
[patent_figures_cnt] => 19
[patent_no_of_words] => 9406
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16393313
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/393313 | Program execution device | Apr 23, 2019 | Issued |
Array
(
[id] => 14724769
[patent_doc_number] => 20190253448
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-08-15
[patent_title] => ASSESSING EFFECTIVENESS OF CYBERSECURITY TECHNOLOGIES
[patent_app_type] => utility
[patent_app_number] => 16/390352
[patent_app_country] => US
[patent_app_date] => 2019-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 14238
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16390352
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/390352 | Assessing effectiveness of cybersecurity technologies | Apr 21, 2019 | Issued |
Array
(
[id] => 16646406
[patent_doc_number] => 10924280
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-02-16
[patent_title] => Digital notary use in distributed ledger technology (DLT) for block construction and verification
[patent_app_type] => utility
[patent_app_number] => 16/384872
[patent_app_country] => US
[patent_app_date] => 2019-04-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 11437
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 140
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16384872
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/384872 | Digital notary use in distributed ledger technology (DLT) for block construction and verification | Apr 14, 2019 | Issued |
Array
(
[id] => 15743929
[patent_doc_number] => 20200110853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-09
[patent_title] => Method and System for Detecting Pirated Video Network Traffic
[patent_app_type] => utility
[patent_app_number] => 16/381571
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6850
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16381571
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/381571 | Method and system for detecting pirated video network traffic | Apr 10, 2019 | Issued |
Array
(
[id] => 15002057
[patent_doc_number] => 20190319986
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-10-17
[patent_title] => SYSTEM AND METHODS FOR DEVELOPING SECURE PLATFORM TO DELIVER END-TO-END PROTECTION AND SAFETY FOR TRANSACTIONS USING MULTI-DIMENSIONAL, MULTI-LAYERED SECURITY CONTROL
[patent_app_type] => utility
[patent_app_number] => 16/382098
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 13328
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -6
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16382098
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/382098 | System and methods for developing secure platform to deliver end-to-end protection and safety for transactions using multi-dimensional, multi-layered security control | Apr 10, 2019 | Issued |
Array
(
[id] => 15743929
[patent_doc_number] => 20200110853
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-04-09
[patent_title] => Method and System for Detecting Pirated Video Network Traffic
[patent_app_type] => utility
[patent_app_number] => 16/381571
[patent_app_country] => US
[patent_app_date] => 2019-04-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6850
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 210
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16381571
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/381571 | Method and system for detecting pirated video network traffic | Apr 10, 2019 | Issued |
Array
(
[id] => 17682637
[patent_doc_number] => 11366892
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-06-21
[patent_title] => Detecting compromised credentials by improved private set intersection
[patent_app_type] => utility
[patent_app_number] => 16/380958
[patent_app_country] => US
[patent_app_date] => 2019-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 9444
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 134
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16380958
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/380958 | Detecting compromised credentials by improved private set intersection | Apr 9, 2019 | Issued |
Array
(
[id] => 15094539
[patent_doc_number] => 20190342081
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => DATA TRANSFER SYSTEM AND TRANSFER METHOD
[patent_app_type] => utility
[patent_app_number] => 16/380621
[patent_app_country] => US
[patent_app_date] => 2019-04-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 24584
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16380621
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/380621 | Data transfer system and transfer method | Apr 9, 2019 | Issued |
Array
(
[id] => 16338433
[patent_doc_number] => 10789393
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2020-09-29
[patent_title] => Computer recovery or return
[patent_app_type] => utility
[patent_app_number] => 16/377768
[patent_app_country] => US
[patent_app_date] => 2019-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 8426
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 150
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16377768
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/377768 | Computer recovery or return | Apr 7, 2019 | Issued |