
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9071507
[patent_doc_number] => 20130263263
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-03
[patent_title] => 'WEB ELEMENT SPOOFING PREVENTION SYSTEM AND METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/992899
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 4673
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13992899
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/992899 | WEB ELEMENT SPOOFING PREVENTION SYSTEM AND METHOD | Dec 11, 2011 | Abandoned |
Array
(
[id] => 8093401
[patent_doc_number] => 20120082311
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-04-05
[patent_title] => 'CONTENT PROTECTION USING BLOCK REORDERING'
[patent_app_type] => utility
[patent_app_number] => 13/316784
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3349
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0082/20120082311.pdf
[firstpage_image] =>[orig_patent_app_number] => 13316784
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316784 | CONTENT PROTECTION USING BLOCK REORDERING | Dec 11, 2011 | Abandoned |
Array
(
[id] => 9592871
[patent_doc_number] => 08782437
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-07-15
[patent_title] => 'Content protection using block reordering'
[patent_app_type] => utility
[patent_app_number] => 13/316773
[patent_app_country] => US
[patent_app_date] => 2011-12-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 10
[patent_no_of_words] => 3359
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 65
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13316773
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/316773 | Content protection using block reordering | Dec 11, 2011 | Issued |
Array
(
[id] => 10901496
[patent_doc_number] => 08924740
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-30
[patent_title] => 'Encryption key transmission with power analysis attack resistance'
[patent_app_type] => utility
[patent_app_number] => 13/314420
[patent_app_country] => US
[patent_app_date] => 2011-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6474
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 94
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13314420
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/314420 | Encryption key transmission with power analysis attack resistance | Dec 7, 2011 | Issued |
Array
(
[id] => 8855786
[patent_doc_number] => 20130145461
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'Security Method for Mobile Ad Hoc Networks with Efficient Flooding Mechanism Using Layer Independent Passive Clustering (LIPC)'
[patent_app_type] => utility
[patent_app_number] => 13/312250
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6772
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13312250
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/312250 | Security method for mobile ad hoc networks with efficient flooding mechanism using layer independent passive clustering (LIPC) | Dec 5, 2011 | Issued |
Array
(
[id] => 8855790
[patent_doc_number] => 20130145465
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'MULTILAYERED DECEPTION FOR INTRUSION DETECTION AND PREVENTION'
[patent_app_type] => utility
[patent_app_number] => 13/311608
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 14298
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13311608
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/311608 | Multilayered deception for intrusion detection and prevention | Dec 5, 2011 | Issued |
Array
(
[id] => 8855795
[patent_doc_number] => 20130145470
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'DETECTING MALWARE USING PATTERNS'
[patent_app_type] => utility
[patent_app_number] => 13/312639
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 6574
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13312639
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/312639 | Detecting malware using patterns | Dec 5, 2011 | Issued |
Array
(
[id] => 8794622
[patent_doc_number] => 20130111591
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-02
[patent_title] => 'Fuzzy Whitelisting Anti-Malware Systems and Methods'
[patent_app_type] => utility
[patent_app_number] => 13/312686
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 8901
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 7
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13312686
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/312686 | Fuzzy whitelisting anti-malware systems and methods | Dec 5, 2011 | Issued |
Array
(
[id] => 8230258
[patent_doc_number] => 20120144464
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'METHOD AND SYSTEM FOR IMPROVED SECURITY'
[patent_app_type] => utility
[patent_app_number] => 13/312934
[patent_app_country] => US
[patent_app_date] => 2011-12-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13282
[patent_no_of_claims] => 31
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13312934
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/312934 | Method and system for improved security | Dec 5, 2011 | Issued |
Array
(
[id] => 8852653
[patent_doc_number] => 20130142329
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'UTILIZING PHYSICALLY UNCLONABLE FUNCTIONS TO DERIVE DEVICE SPECIFIC KEYING MATERIAL FOR PROTECTION OF INFORMATION'
[patent_app_type] => utility
[patent_app_number] => 13/310419
[patent_app_country] => US
[patent_app_date] => 2011-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4842
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310419
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/310419 | Utilizing physically unclonable functions to derive device specific keying material for protection of information | Dec 1, 2011 | Issued |
Array
(
[id] => 8230276
[patent_doc_number] => 20120144487
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-06-07
[patent_title] => 'ROUTING APPARATUS AND METHOD FOR DETECTING SERVER ATTACK AND NETWORK USING THE SAME'
[patent_app_type] => utility
[patent_app_number] => 13/310215
[patent_app_country] => US
[patent_app_date] => 2011-12-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4934
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13310215
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/310215 | Routing apparatus and method for detecting server attack and network using the same | Dec 1, 2011 | Issued |
Array
(
[id] => 8855794
[patent_doc_number] => 20130145469
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-06
[patent_title] => 'PREVENTING AND DETECTING PRINT-PROVIDER STARTUP MALWARE'
[patent_app_type] => utility
[patent_app_number] => 13/309225
[patent_app_country] => US
[patent_app_date] => 2011-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 7593
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13309225
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/309225 | Preventing and detecting print-provider startup malware | Nov 30, 2011 | Issued |
Array
(
[id] => 8823736
[patent_doc_number] => 20130124781
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-05-16
[patent_title] => 'DATA SCRAMBLING BASED ON TRANSITION CHARACTERISTIC OF THE DATA'
[patent_app_type] => utility
[patent_app_number] => 13/307610
[patent_app_country] => US
[patent_app_date] => 2011-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 7243
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13307610
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/307610 | Data scrambling based on transition characteristic of the data | Nov 29, 2011 | Issued |
Array
(
[id] => 9083508
[patent_doc_number] => 20130269038
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-10-10
[patent_title] => 'INFORMATION PROTECTION DEVICE AND INFORMATION PROTECTION METHOD'
[patent_app_type] => utility
[patent_app_number] => 13/993250
[patent_app_country] => US
[patent_app_date] => 2011-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10834
[patent_no_of_claims] => 11
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13993250
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/993250 | Information protection device and information protection method | Nov 24, 2011 | Issued |
Array
(
[id] => 8046459
[patent_doc_number] => 20120072970
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-03-22
[patent_title] => 'CHAINING INFORMATION CARD SELECTORS'
[patent_app_type] => utility
[patent_app_number] => 13/302938
[patent_app_country] => US
[patent_app_date] => 2011-11-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 3933
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0072/20120072970.pdf
[firstpage_image] =>[orig_patent_app_number] => 13302938
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/302938 | Chaining information card selectors | Nov 21, 2011 | Issued |
Array
(
[id] => 8223147
[patent_doc_number] => 20120137355
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-31
[patent_title] => 'Methods for Accessing Content Based on a Session Ticket'
[patent_app_type] => utility
[patent_app_number] => 13/300306
[patent_app_country] => US
[patent_app_date] => 2011-11-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 12
[patent_no_of_words] => 6166
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13300306
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/300306 | Methods for accessing content based on a session ticket | Nov 17, 2011 | Issued |
Array
(
[id] => 9358937
[patent_doc_number] => 08677494
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-03-18
[patent_title] => 'Malicious mobile code runtime monitoring system and methods'
[patent_app_type] => utility
[patent_app_number] => 13/290708
[patent_app_country] => US
[patent_app_date] => 2011-11-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 18
[patent_no_of_words] => 11377
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 43
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13290708
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/290708 | Malicious mobile code runtime monitoring system and methods | Nov 6, 2011 | Issued |
Array
(
[id] => 10879716
[patent_doc_number] => 08904515
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2014-12-02
[patent_title] => 'System and method for controlling devices at a location'
[patent_app_type] => utility
[patent_app_number] => 13/289120
[patent_app_country] => US
[patent_app_date] => 2011-11-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 7915
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 90
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13289120
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/289120 | System and method for controlling devices at a location | Nov 3, 2011 | Issued |
Array
(
[id] => 8728616
[patent_doc_number] => 08407758
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-03-26
[patent_title] => 'Network security appliance'
[patent_app_type] => utility
[patent_app_number] => 13/274105
[patent_app_country] => US
[patent_app_date] => 2011-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 17
[patent_no_of_words] => 7904
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13274105
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/274105 | Network security appliance | Oct 13, 2011 | Issued |
Array
(
[id] => 9652543
[patent_doc_number] => 08806579
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2014-08-12
[patent_title] => 'Secure partitioning of devices connected to aircraft network data processing systems'
[patent_app_type] => utility
[patent_app_number] => 13/271871
[patent_app_country] => US
[patent_app_date] => 2011-10-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 9814
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 128
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13271871
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/271871 | Secure partitioning of devices connected to aircraft network data processing systems | Oct 11, 2011 | Issued |