
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11213773
[patent_doc_number] => 09442808
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-09-13
[patent_title] => 'Session tickets for a backup and recovery system'
[patent_app_type] => utility
[patent_app_number] => 14/586227
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2761
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 118
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586227
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586227 | Session tickets for a backup and recovery system | Dec 29, 2014 | Issued |
Array
(
[id] => 10303948
[patent_doc_number] => 20150188948
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-02
[patent_title] => 'METHOD AND SYSTEM FOR BLOCKING CONTENT'
[patent_app_type] => utility
[patent_app_number] => 14/586405
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9509
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586405
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586405 | METHOD AND SYSTEM FOR BLOCKING CONTENT | Dec 29, 2014 | Abandoned |
Array
(
[id] => 11266854
[patent_doc_number] => 09491169
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-11-08
[patent_title] => 'Generation and authentication of biometric information using watermark'
[patent_app_type] => utility
[patent_app_number] => 14/586119
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 5
[patent_no_of_words] => 5477
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 71
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586119
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586119 | Generation and authentication of biometric information using watermark | Dec 29, 2014 | Issued |
Array
(
[id] => 12956722
[patent_doc_number] => 09838417
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2017-12-05
[patent_title] => Intelligent context aware user interaction for malware detection
[patent_app_type] => utility
[patent_app_number] => 14/586233
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 10522
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586233
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586233 | Intelligent context aware user interaction for malware detection | Dec 29, 2014 | Issued |
Array
(
[id] => 10303949
[patent_doc_number] => 20150188949
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-07-02
[patent_title] => 'CLOUD-BASED NETWORK SECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/586759
[patent_app_country] => US
[patent_app_date] => 2014-12-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 23
[patent_figures_cnt] => 23
[patent_no_of_words] => 44379
[patent_no_of_claims] => 44
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14586759
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/586759 | CLOUD-BASED NETWORK SECURITY | Dec 29, 2014 | Abandoned |
Array
(
[id] => 12149115
[patent_doc_number] => 09883391
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-01-30
[patent_title] => 'Wireless session configuration persistence'
[patent_app_type] => utility
[patent_app_number] => 14/583872
[patent_app_country] => US
[patent_app_date] => 2014-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 5394
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 97
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14583872
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/583872 | Wireless session configuration persistence | Dec 28, 2014 | Issued |
Array
(
[id] => 15079475
[patent_doc_number] => 10469247
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2019-11-05
[patent_title] => Stream ciphering technique
[patent_app_type] => utility
[patent_app_number] => 15/535994
[patent_app_country] => US
[patent_app_date] => 2014-12-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10661
[patent_no_of_claims] => 62
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15535994
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/535994 | Stream ciphering technique | Dec 16, 2014 | Issued |
Array
(
[id] => 12004552
[patent_doc_number] => 20170308707
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-10-26
[patent_title] => 'Mechanism to Calculate Probability of a Cyber Security Incident'
[patent_app_type] => utility
[patent_app_number] => 14/571245
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 2222
[patent_no_of_claims] => 4
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571245
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571245 | Mechanism to Calculate Probability of a Cyber Security Incident | Dec 14, 2014 | Abandoned |
Array
(
[id] => 10189060
[patent_doc_number] => 09218480
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-22
[patent_title] => 'Method and system for improved security utilizing location based services for authentication'
[patent_app_type] => utility
[patent_app_number] => 14/553212
[patent_app_country] => US
[patent_app_date] => 2014-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 13359
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 99
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14553212
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/553212 | Method and system for improved security utilizing location based services for authentication | Nov 24, 2014 | Issued |
Array
(
[id] => 9919225
[patent_doc_number] => 20150074430
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-12
[patent_title] => 'SECURE DATA PARSER METHOD AND SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/546887
[patent_app_country] => US
[patent_app_date] => 2014-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 43
[patent_figures_cnt] => 43
[patent_no_of_words] => 48251
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14546887
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/546887 | Secure data parser method and system | Nov 17, 2014 | Issued |
Array
(
[id] => 12934069
[patent_doc_number] => 09830568
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-11-28
[patent_title] => Controlling and managing identity access risk
[patent_app_type] => utility
[patent_app_number] => 14/522804
[patent_app_country] => US
[patent_app_date] => 2014-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 11
[patent_no_of_words] => 7381
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 144
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14522804
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/522804 | Controlling and managing identity access risk | Oct 23, 2014 | Issued |
Array
(
[id] => 10261872
[patent_doc_number] => 20150146869
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-28
[patent_title] => 'ELECTRONIC CIRCUIT, ELECTRONIC APPARATUS, AND AUTHENTICATION SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 14/521616
[patent_app_country] => US
[patent_app_date] => 2014-10-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 11730
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14521616
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/521616 | Electronic circuit, electronic apparatus, and authentication system | Oct 22, 2014 | Issued |
Array
(
[id] => 10759288
[patent_doc_number] => 20160105441
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2016-04-14
[patent_title] => 'Providing Restricted Access to Given Devices by Constructing Abstract Devices'
[patent_app_type] => utility
[patent_app_number] => 14/512634
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6578
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512634
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512634 | Providing restricted access to given devices by constructing abstract devices | Oct 12, 2014 | Issued |
Array
(
[id] => 10501692
[patent_doc_number] => 09230093
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-01-05
[patent_title] => 'Protection method and system for computer security'
[patent_app_type] => utility
[patent_app_number] => 14/512926
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 4
[patent_no_of_words] => 4048
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 224
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512926
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512926 | Protection method and system for computer security | Oct 12, 2014 | Issued |
Array
(
[id] => 10221912
[patent_doc_number] => 20150106905
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'LOGIN METHOD FOR CLIENT APPLICATION AND CORRESPONDING SERVER'
[patent_app_type] => utility
[patent_app_number] => 14/512723
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9223
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512723
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512723 | Login method for client application and corresponding server | Oct 12, 2014 | Issued |
Array
(
[id] => 11792251
[patent_doc_number] => 09401912
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-07-26
[patent_title] => 'Late binding authentication'
[patent_app_type] => utility
[patent_app_number] => 14/512772
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3948
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512772
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512772 | Late binding authentication | Oct 12, 2014 | Issued |
Array
(
[id] => 11247434
[patent_doc_number] => 09473490
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-10-18
[patent_title] => 'Bidirectional authentication'
[patent_app_type] => utility
[patent_app_number] => 14/512911
[patent_app_country] => US
[patent_app_date] => 2014-10-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5851
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 105
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512911
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512911 | Bidirectional authentication | Oct 12, 2014 | Issued |
Array
(
[id] => 10357621
[patent_doc_number] => 20150242626
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-08-27
[patent_title] => 'METHOD OF GENERATING IN-KERNEL HOOK POINT CANDIDATES TO DETECT ROOTKITS AND THE SYSTEM THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/512420
[patent_app_country] => US
[patent_app_date] => 2014-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10242
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14512420
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/512420 | Method of generating in-kernel hook point candidates to detect rootkits and the system thereof | Oct 10, 2014 | Issued |
Array
(
[id] => 10221891
[patent_doc_number] => 20150106884
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-04-16
[patent_title] => 'MEMCACHED MULTI-TENANCY OFFLOAD'
[patent_app_type] => utility
[patent_app_number] => 14/511913
[patent_app_country] => US
[patent_app_date] => 2014-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5194
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14511913
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/511913 | MEMCACHED MULTI-TENANCY OFFLOAD | Oct 9, 2014 | Abandoned |
Array
(
[id] => 10545525
[patent_doc_number] => 09270670
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2016-02-23
[patent_title] => 'Systems and methods for providing a covert password manager'
[patent_app_type] => utility
[patent_app_number] => 14/511664
[patent_app_country] => US
[patent_app_date] => 2014-10-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 9374
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 302
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14511664
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/511664 | Systems and methods for providing a covert password manager | Oct 9, 2014 | Issued |