
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9341968
[patent_doc_number] => 20140068752
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-06
[patent_title] => 'ELECTRONIC DEVICE FOR RELEASING LOCK FUNCTION USING A PLURALITY OF OBJECTS AND METHOD THEREOF'
[patent_app_type] => utility
[patent_app_number] => 14/012090
[patent_app_country] => US
[patent_app_date] => 2013-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 12206
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14012090
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/012090 | ELECTRONIC DEVICE FOR RELEASING LOCK FUNCTION USING A PLURALITY OF OBJECTS AND METHOD THEREOF | Aug 27, 2013 | Abandoned |
Array
(
[id] => 10126373
[patent_doc_number] => 09160749
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-13
[patent_title] => 'System and method for providing whitelist functionality for use with a cloud computing environment'
[patent_app_type] => utility
[patent_app_number] => 14/010846
[patent_app_country] => US
[patent_app_date] => 2013-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 9438
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 222
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010846
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/010846 | System and method for providing whitelist functionality for use with a cloud computing environment | Aug 26, 2013 | Issued |
Array
(
[id] => 10173102
[patent_doc_number] => 09203822
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-12-01
[patent_title] => 'Network system, data processing apparatus, and method for multi-factor authentication'
[patent_app_type] => utility
[patent_app_number] => 14/010651
[patent_app_country] => US
[patent_app_date] => 2013-08-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 34
[patent_figures_cnt] => 37
[patent_no_of_words] => 16418
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 157
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010651
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/010651 | Network system, data processing apparatus, and method for multi-factor authentication | Aug 26, 2013 | Issued |
Array
(
[id] => 10637766
[patent_doc_number] => 09355272
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-05-31
[patent_title] => 'Computing system with privacy mechanism and method of operation thereof'
[patent_app_type] => utility
[patent_app_number] => 14/010331
[patent_app_country] => US
[patent_app_date] => 2013-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 10621
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010331
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/010331 | Computing system with privacy mechanism and method of operation thereof | Aug 25, 2013 | Issued |
Array
(
[id] => 9365308
[patent_doc_number] => 20140075181
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-13
[patent_title] => 'SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 14/010437
[patent_app_country] => US
[patent_app_date] => 2013-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 10753
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14010437
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/010437 | Systems and methods for providing conditional access to transmitted information | Aug 25, 2013 | Issued |
Array
(
[id] => 9317982
[patent_doc_number] => 20140050320
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-02-20
[patent_title] => 'ENHANCEMENTS TO ENABLE FAST SECURITY SETUP'
[patent_app_type] => utility
[patent_app_number] => 13/967484
[patent_app_country] => US
[patent_app_date] => 2013-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 51
[patent_figures_cnt] => 51
[patent_no_of_words] => 32397
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13967484
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/967484 | Enhancements to enable fast security setup | Aug 14, 2013 | Issued |
Array
(
[id] => 9878965
[patent_doc_number] => 08966261
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-02-24
[patent_title] => 'Method for secure remote backup'
[patent_app_type] => utility
[patent_app_number] => 13/959532
[patent_app_country] => US
[patent_app_date] => 2013-08-05
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2795
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 104
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13959532
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/959532 | Method for secure remote backup | Aug 4, 2013 | Issued |
Array
(
[id] => 9163787
[patent_doc_number] => 20130312064
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-11-21
[patent_title] => 'PROGRAM EXECUTION DEVICE'
[patent_app_type] => utility
[patent_app_number] => 13/952244
[patent_app_country] => US
[patent_app_date] => 2013-07-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 20
[patent_figures_cnt] => 20
[patent_no_of_words] => 9641
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13952244
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/952244 | Program execution device | Jul 25, 2013 | Issued |
Array
(
[id] => 9605127
[patent_doc_number] => 20140201809
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-07-17
[patent_title] => 'Characteristics of Security Associations'
[patent_app_type] => utility
[patent_app_number] => 13/940794
[patent_app_country] => US
[patent_app_date] => 2013-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 16628
[patent_no_of_claims] => 33
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13940794
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/940794 | Characteristics of security associations | Jul 11, 2013 | Issued |
Array
(
[id] => 9033379
[patent_doc_number] => 20130236017
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 13/892827
[patent_app_country] => US
[patent_app_date] => 2013-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4504
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13892827
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/892827 | Telecommunication systems and encryption of control messages in such systems | May 12, 2013 | Issued |
Array
(
[id] => 9372826
[patent_doc_number] => 20140082699
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-03-20
[patent_title] => 'SYSTEMS AND METHODS FOR ASSOCIATING A VIRTUAL MACHINE WITH AN ACCESS CONTROL RIGHT'
[patent_app_type] => utility
[patent_app_number] => 13/875109
[patent_app_country] => US
[patent_app_date] => 2013-05-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7996
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13875109
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/875109 | Systems and methods for associating a virtual machine with an access control right | Apr 30, 2013 | Issued |
Array
(
[id] => 10042972
[patent_doc_number] => 09083693
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-07-14
[patent_title] => 'Managing private information in instant messaging'
[patent_app_type] => utility
[patent_app_number] => 13/993032
[patent_app_country] => US
[patent_app_date] => 2013-04-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 13
[patent_no_of_words] => 6390
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 245
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13993032
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/993032 | Managing private information in instant messaging | Apr 26, 2013 | Issued |
Array
(
[id] => 10133135
[patent_doc_number] => 09166987
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-10-20
[patent_title] => 'Preventing identity fraud for instant messaging'
[patent_app_type] => utility
[patent_app_number] => 13/993295
[patent_app_country] => US
[patent_app_date] => 2013-04-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 10
[patent_no_of_words] => 5290
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13993295
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/993295 | Preventing identity fraud for instant messaging | Apr 24, 2013 | Issued |
Array
(
[id] => 9033374
[patent_doc_number] => 20130236012
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-09-12
[patent_title] => 'Public Key Cryptographic Methods and Systems'
[patent_app_type] => utility
[patent_app_number] => 13/864795
[patent_app_country] => US
[patent_app_date] => 2013-04-17
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6331
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13864795
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/864795 | Public Key Cryptographic Methods and Systems | Apr 16, 2013 | Abandoned |
Array
(
[id] => 9486510
[patent_doc_number] => 08732472
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-05-20
[patent_title] => 'System and method for verification of digital certificates'
[patent_app_type] => utility
[patent_app_number] => 13/862119
[patent_app_country] => US
[patent_app_date] => 2013-04-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10099
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 213
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13862119
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/862119 | System and method for verification of digital certificates | Apr 11, 2013 | Issued |
Array
(
[id] => 10152789
[patent_doc_number] => 09185097
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-10
[patent_title] => 'Method and system for traffic engineering in secured networks'
[patent_app_type] => utility
[patent_app_number] => 13/858266
[patent_app_country] => US
[patent_app_date] => 2013-04-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 7579
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 76
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13858266
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/858266 | Method and system for traffic engineering in secured networks | Apr 7, 2013 | Issued |
Array
(
[id] => 10243260
[patent_doc_number] => 20150128254
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'OFFLINE AUTHENTICATION WITH EMBEDDED AUTHORIZATION ATTRIBUTES'
[patent_app_type] => utility
[patent_app_number] => 14/396693
[patent_app_country] => US
[patent_app_date] => 2013-03-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6531
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14396693
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/396693 | Offline authentication with embedded authorization attributes | Mar 21, 2013 | Issued |
Array
(
[id] => 10552094
[patent_doc_number] => 09276736
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-03-01
[patent_title] => 'Connection key distribution'
[patent_app_type] => utility
[patent_app_number] => 13/804431
[patent_app_country] => US
[patent_app_date] => 2013-03-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 5909
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 114
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13804431
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/804431 | Connection key distribution | Mar 13, 2013 | Issued |
Array
(
[id] => 9083151
[patent_doc_number] => 20130268681
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'Method and Apparatuses for End-to-Edge Media Protection in ANIMS System'
[patent_app_type] => utility
[patent_app_number] => 13/800129
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 6624
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13800129
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/800129 | Method and apparatuses for end-to-edge media protection in an IMS system | Mar 12, 2013 | Issued |
Array
(
[id] => 9452116
[patent_doc_number] => 20140123286
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-05-01
[patent_title] => 'Detection Of Return Oriented Programming Attacks'
[patent_app_type] => utility
[patent_app_number] => 13/799663
[patent_app_country] => US
[patent_app_date] => 2013-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 9523
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13799663
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/799663 | Detection of return oriented programming attacks | Mar 12, 2013 | Issued |