Search

Patricia C. Mallari

Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )

Most Active Art Unit
3735
Art Unit(s)
1600, 3735, 3736, 3791
Total Applications
826
Issued Applications
495
Pending Applications
107
Abandoned Applications
230

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 9848286 [patent_doc_number] => RE045368 [patent_country] => US [patent_kind] => E1 [patent_issue_date] => 2015-02-10 [patent_title] => 'Communication apparatus and communication system' [patent_app_type] => reissue [patent_app_number] => 13/045876 [patent_app_country] => US [patent_app_date] => 2011-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 78 [patent_figures_cnt] => 78 [patent_no_of_words] => 39710 [patent_no_of_claims] => 12 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 124 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045876 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/045876
Communication apparatus and communication system Mar 10, 2011 Issued
Array ( [id] => 7736174 [patent_doc_number] => 20120017280 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-01-19 [patent_title] => 'APPARATUS AND METHOD FOR DETECTING, PRIORITIZING AND FIXING SECURITY DEFECTS AND COMPLIANCE VIOLATIONS IN SAP® ABAPtm CODE' [patent_app_type] => utility [patent_app_number] => 13/046257 [patent_app_country] => US [patent_app_date] => 2011-03-11 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 5896 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0017/20120017280.pdf [firstpage_image] =>[orig_patent_app_number] => 13046257 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/046257
Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in SAP® ABAP™ code Mar 10, 2011 Issued
Array ( [id] => 8894038 [patent_doc_number] => 20130167222 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-06-27 [patent_title] => 'USING A CALL GATE TO PREVENT SECURE SANDBOX LEAKAGE' [patent_app_type] => utility [patent_app_number] => 13/045339 [patent_app_country] => US [patent_app_date] => 2011-03-10 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 10602 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045339 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/045339
Using a call gate to prevent secure sandbox leakage Mar 9, 2011 Issued
Array ( [id] => 9200720 [patent_doc_number] => 20130340035 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2013-12-19 [patent_title] => 'PERFORMING A CHANGE PROCESS BASED ON A POLICY' [patent_app_type] => utility [patent_app_number] => 14/001782 [patent_app_country] => US [patent_app_date] => 2011-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 3119 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14001782 [rel_patent_id] =>[rel_patent_doc_number] =>)
14/001782
PERFORMING A CHANGE PROCESS BASED ON A POLICY Mar 8, 2011 Abandoned
Array ( [id] => 6021021 [patent_doc_number] => 20110225657 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-09-15 [patent_title] => 'METHOD AND APPARATUS FOR PREVENTING ILLEGAL SOFTWARE DOWNLOAD OF PORTABLE TERMINAL IN COMPUTER SYSTEM' [patent_app_type] => utility [patent_app_number] => 13/043906 [patent_app_country] => US [patent_app_date] => 2011-03-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 4067 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0225/20110225657.pdf [firstpage_image] =>[orig_patent_app_number] => 13043906 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/043906
METHOD AND APPARATUS FOR PREVENTING ILLEGAL SOFTWARE DOWNLOAD OF PORTABLE TERMINAL IN COMPUTER SYSTEM Mar 8, 2011 Abandoned
Array ( [id] => 8183580 [patent_doc_number] => 08181237 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-15 [patent_title] => 'Method for improving security of computer networks' [patent_app_type] => utility [patent_app_number] => 13/034697 [patent_app_country] => US [patent_app_date] => 2011-02-24 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 4057 [patent_no_of_claims] => 7 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 166 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/181/08181237.pdf [firstpage_image] =>[orig_patent_app_number] => 13034697 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/034697
Method for improving security of computer networks Feb 23, 2011 Issued
Array ( [id] => 8194700 [patent_doc_number] => 08185735 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-22 [patent_title] => 'System and method for lost data destruction of electronic data stored on portable electronic devices' [patent_app_type] => utility [patent_app_number] => 13/022379 [patent_app_country] => US [patent_app_date] => 2011-02-07 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 7 [patent_no_of_words] => 6998 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 168 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/185/08185735.pdf [firstpage_image] =>[orig_patent_app_number] => 13022379 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/022379
System and method for lost data destruction of electronic data stored on portable electronic devices Feb 6, 2011 Issued
Array ( [id] => 6189832 [patent_doc_number] => 20110126278 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-26 [patent_title] => 'METHOD AND APPARATUS FOR LOCAL AREA NETWORKS' [patent_app_type] => utility [patent_app_number] => 13/020673 [patent_app_country] => US [patent_app_date] => 2011-02-03 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 4509 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0126/20110126278.pdf [firstpage_image] =>[orig_patent_app_number] => 13020673 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/020673
Method and apparatus for local area networks Feb 2, 2011 Issued
Array ( [id] => 8581135 [patent_doc_number] => 08347367 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2013-01-01 [patent_title] => 'Techniques for entry of less than perfect passwords' [patent_app_type] => utility [patent_app_number] => 13/015103 [patent_app_country] => US [patent_app_date] => 2011-01-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 3 [patent_no_of_words] => 1178 [patent_no_of_claims] => 13 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 152 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13015103 [rel_patent_id] =>[rel_patent_doc_number] =>)
13/015103
Techniques for entry of less than perfect passwords Jan 26, 2011 Issued
Array ( [id] => 5946372 [patent_doc_number] => 20110106340 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-05 [patent_title] => 'Method of accessing a device in a communication network in a motor vehicle via an external device and gateway' [patent_app_type] => utility [patent_app_number] => 12/985969 [patent_app_country] => US [patent_app_date] => 2011-01-06 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 2 [patent_figures_cnt] => 2 [patent_no_of_words] => 2411 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0106/20110106340.pdf [firstpage_image] =>[orig_patent_app_number] => 12985969 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/985969
Method of accessing a device in a communication network in a motor vehicle via an external device and gateway Jan 5, 2011 Abandoned
Array ( [id] => 6125434 [patent_doc_number] => 20110078452 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-03-31 [patent_title] => 'METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS' [patent_app_type] => utility [patent_app_number] => 12/963486 [patent_app_country] => US [patent_app_date] => 2010-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 5151 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0078/20110078452.pdf [firstpage_image] =>[orig_patent_app_number] => 12963486 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/963486
Method to control access between network endpoints based on trust scores calculated from information system component analysis Dec 7, 2010 Issued
Array ( [id] => 6189851 [patent_doc_number] => 20110126294 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-05-26 [patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING DISTRIBUTION OF DIGITAL CONTENT IN A FILE SHARING SYSTEM USING LICENSE-BASED VERIFICATION, ENCODED TAGGING, AND TIME-LIMITED FRAGMENT VALIDITY' [patent_app_type] => utility [patent_app_number] => 12/963395 [patent_app_country] => US [patent_app_date] => 2010-12-08 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 6 [patent_figures_cnt] => 6 [patent_no_of_words] => 14085 [patent_no_of_claims] => 18 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0126/20110126294.pdf [firstpage_image] =>[orig_patent_app_number] => 12963395 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/963395
Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity Dec 7, 2010 Issued
Array ( [id] => 7798639 [patent_doc_number] => 08127357 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2012-02-28 [patent_title] => 'Method to detect SYN flood attack' [patent_app_type] => utility [patent_app_number] => 12/943555 [patent_app_country] => US [patent_app_date] => 2010-11-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 9 [patent_no_of_words] => 5976 [patent_no_of_claims] => 15 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 257 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/127/08127357.pdf [firstpage_image] =>[orig_patent_app_number] => 12943555 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/943555
Method to detect SYN flood attack Nov 29, 2010 Issued
Array ( [id] => 8177144 [patent_doc_number] => 20120110641 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2012-05-03 [patent_title] => 'TRAFFIC STEERING SYSTEM' [patent_app_type] => utility [patent_app_number] => 12/913823 [patent_app_country] => US [patent_app_date] => 2010-10-28 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 6455 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0110/20120110641.pdf [firstpage_image] =>[orig_patent_app_number] => 12913823 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/913823
Traffic steering system Oct 27, 2010 Issued
Array ( [id] => 5951634 [patent_doc_number] => 20110033047 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-02-10 [patent_title] => 'BRIDGED CRYPTOGRAPHIC VLAN' [patent_app_type] => utility [patent_app_number] => 12/880894 [patent_app_country] => US [patent_app_date] => 2010-09-13 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 4 [patent_figures_cnt] => 4 [patent_no_of_words] => 5478 [patent_no_of_claims] => 5 [patent_no_of_ind_claims] => 5 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0033/20110033047.pdf [firstpage_image] =>[orig_patent_app_number] => 12880894 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/880894
Bridged cryptographic VLAN Sep 12, 2010 Issued
Array ( [id] => 8180660 [patent_doc_number] => 08180046 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-05-15 [patent_title] => 'Method for making secure an electronic entity with encrypted access' [patent_app_type] => utility [patent_app_number] => 12/852637 [patent_app_country] => US [patent_app_date] => 2010-08-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 2819 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 1 [patent_words_short_claim] => 102 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] => patents/08/180/08180046.pdf [firstpage_image] =>[orig_patent_app_number] => 12852637 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/852637
Method for making secure an electronic entity with encrypted access Aug 8, 2010 Issued
Array ( [id] => 8318826 [patent_doc_number] => 08233617 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-07-31 [patent_title] => 'Resilient cryptographic scheme' [patent_app_type] => utility [patent_app_number] => 12/840008 [patent_app_country] => US [patent_app_date] => 2010-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 3 [patent_figures_cnt] => 4 [patent_no_of_words] => 1948 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 6 [patent_words_short_claim] => 69 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12840008 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/840008
Resilient cryptographic scheme Jul 19, 2010 Issued
Array ( [id] => 7697650 [patent_doc_number] => 20110228940 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2011-09-22 [patent_title] => 'REMOTE REGISTRATION FOR ENTERPRISE APPLICATIONS' [patent_app_type] => utility [patent_app_number] => 12/827399 [patent_app_country] => US [patent_app_date] => 2010-06-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 21 [patent_figures_cnt] => 21 [patent_no_of_words] => 16114 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 0 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] => publications/A1/0228/20110228940.pdf [firstpage_image] =>[orig_patent_app_number] => 12827399 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/827399
Remote registration for enterprise applications Jun 29, 2010 Issued
Array ( [id] => 8861803 [patent_doc_number] => 08464357 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2013-06-11 [patent_title] => 'Methods and systems for fingerprint-based copyright protection of real-time content' [patent_app_type] => utility [patent_app_number] => 12/819452 [patent_app_country] => US [patent_app_date] => 2010-06-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 1 [patent_figures_cnt] => 1 [patent_no_of_words] => 1898 [patent_no_of_claims] => 24 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 159 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12819452 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/819452
Methods and systems for fingerprint-based copyright protection of real-time content Jun 20, 2010 Issued
Array ( [id] => 8562032 [patent_doc_number] => 08336103 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2012-12-18 [patent_title] => 'Data structure for policy-based remediation selection' [patent_app_type] => utility [patent_app_number] => 12/819891 [patent_app_country] => US [patent_app_date] => 2010-06-21 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 15 [patent_no_of_words] => 11585 [patent_no_of_claims] => 6 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 242 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12819891 [rel_patent_id] =>[rel_patent_doc_number] =>)
12/819891
Data structure for policy-based remediation selection Jun 20, 2010 Issued
Menu