
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 9848286
[patent_doc_number] => RE045368
[patent_country] => US
[patent_kind] => E1
[patent_issue_date] => 2015-02-10
[patent_title] => 'Communication apparatus and communication system'
[patent_app_type] => reissue
[patent_app_number] => 13/045876
[patent_app_country] => US
[patent_app_date] => 2011-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 78
[patent_figures_cnt] => 78
[patent_no_of_words] => 39710
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045876
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/045876 | Communication apparatus and communication system | Mar 10, 2011 | Issued |
Array
(
[id] => 7736174
[patent_doc_number] => 20120017280
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-01-19
[patent_title] => 'APPARATUS AND METHOD FOR DETECTING, PRIORITIZING AND FIXING SECURITY DEFECTS AND COMPLIANCE VIOLATIONS IN SAP® ABAPtm CODE'
[patent_app_type] => utility
[patent_app_number] => 13/046257
[patent_app_country] => US
[patent_app_date] => 2011-03-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 5896
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0017/20120017280.pdf
[firstpage_image] =>[orig_patent_app_number] => 13046257
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/046257 | Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in SAP® ABAP™ code | Mar 10, 2011 | Issued |
Array
(
[id] => 8894038
[patent_doc_number] => 20130167222
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-06-27
[patent_title] => 'USING A CALL GATE TO PREVENT SECURE SANDBOX LEAKAGE'
[patent_app_type] => utility
[patent_app_number] => 13/045339
[patent_app_country] => US
[patent_app_date] => 2011-03-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 10602
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13045339
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/045339 | Using a call gate to prevent secure sandbox leakage | Mar 9, 2011 | Issued |
Array
(
[id] => 9200720
[patent_doc_number] => 20130340035
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2013-12-19
[patent_title] => 'PERFORMING A CHANGE PROCESS BASED ON A POLICY'
[patent_app_type] => utility
[patent_app_number] => 14/001782
[patent_app_country] => US
[patent_app_date] => 2011-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3119
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14001782
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/001782 | PERFORMING A CHANGE PROCESS BASED ON A POLICY | Mar 8, 2011 | Abandoned |
Array
(
[id] => 6021021
[patent_doc_number] => 20110225657
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-15
[patent_title] => 'METHOD AND APPARATUS FOR PREVENTING ILLEGAL SOFTWARE DOWNLOAD OF PORTABLE TERMINAL IN COMPUTER SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 13/043906
[patent_app_country] => US
[patent_app_date] => 2011-03-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4067
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0225/20110225657.pdf
[firstpage_image] =>[orig_patent_app_number] => 13043906
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/043906 | METHOD AND APPARATUS FOR PREVENTING ILLEGAL SOFTWARE DOWNLOAD OF PORTABLE TERMINAL IN COMPUTER SYSTEM | Mar 8, 2011 | Abandoned |
Array
(
[id] => 8183580
[patent_doc_number] => 08181237
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-15
[patent_title] => 'Method for improving security of computer networks'
[patent_app_type] => utility
[patent_app_number] => 13/034697
[patent_app_country] => US
[patent_app_date] => 2011-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4057
[patent_no_of_claims] => 7
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 166
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/181/08181237.pdf
[firstpage_image] =>[orig_patent_app_number] => 13034697
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/034697 | Method for improving security of computer networks | Feb 23, 2011 | Issued |
Array
(
[id] => 8194700
[patent_doc_number] => 08185735
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-22
[patent_title] => 'System and method for lost data destruction of electronic data stored on portable electronic devices'
[patent_app_type] => utility
[patent_app_number] => 13/022379
[patent_app_country] => US
[patent_app_date] => 2011-02-07
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6998
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 168
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/185/08185735.pdf
[firstpage_image] =>[orig_patent_app_number] => 13022379
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/022379 | System and method for lost data destruction of electronic data stored on portable electronic devices | Feb 6, 2011 | Issued |
Array
(
[id] => 6189832
[patent_doc_number] => 20110126278
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'METHOD AND APPARATUS FOR LOCAL AREA NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 13/020673
[patent_app_country] => US
[patent_app_date] => 2011-02-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 4509
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126278.pdf
[firstpage_image] =>[orig_patent_app_number] => 13020673
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/020673 | Method and apparatus for local area networks | Feb 2, 2011 | Issued |
Array
(
[id] => 8581135
[patent_doc_number] => 08347367
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2013-01-01
[patent_title] => 'Techniques for entry of less than perfect passwords'
[patent_app_type] => utility
[patent_app_number] => 13/015103
[patent_app_country] => US
[patent_app_date] => 2011-01-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 1178
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 152
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 13015103
[rel_patent_id] =>[rel_patent_doc_number] =>) 13/015103 | Techniques for entry of less than perfect passwords | Jan 26, 2011 | Issued |
Array
(
[id] => 5946372
[patent_doc_number] => 20110106340
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-05
[patent_title] => 'Method of accessing a device in a communication network in a motor vehicle via an external device and gateway'
[patent_app_type] => utility
[patent_app_number] => 12/985969
[patent_app_country] => US
[patent_app_date] => 2011-01-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 2411
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0106/20110106340.pdf
[firstpage_image] =>[orig_patent_app_number] => 12985969
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/985969 | Method of accessing a device in a communication network in a motor vehicle via an external device and gateway | Jan 5, 2011 | Abandoned |
Array
(
[id] => 6125434
[patent_doc_number] => 20110078452
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-03-31
[patent_title] => 'METHOD TO CONTROL ACCESS BETWEEN NETWORK ENDPOINTS BASED ON TRUST SCORES CALCULATED FROM INFORMATION SYSTEM COMPONENT ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 12/963486
[patent_app_country] => US
[patent_app_date] => 2010-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 5151
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0078/20110078452.pdf
[firstpage_image] =>[orig_patent_app_number] => 12963486
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/963486 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | Dec 7, 2010 | Issued |
Array
(
[id] => 6189851
[patent_doc_number] => 20110126294
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-05-26
[patent_title] => 'METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING DISTRIBUTION OF DIGITAL CONTENT IN A FILE SHARING SYSTEM USING LICENSE-BASED VERIFICATION, ENCODED TAGGING, AND TIME-LIMITED FRAGMENT VALIDITY'
[patent_app_type] => utility
[patent_app_number] => 12/963395
[patent_app_country] => US
[patent_app_date] => 2010-12-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 14085
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0126/20110126294.pdf
[firstpage_image] =>[orig_patent_app_number] => 12963395
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/963395 | Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity | Dec 7, 2010 | Issued |
Array
(
[id] => 7798639
[patent_doc_number] => 08127357
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2012-02-28
[patent_title] => 'Method to detect SYN flood attack'
[patent_app_type] => utility
[patent_app_number] => 12/943555
[patent_app_country] => US
[patent_app_date] => 2010-11-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 9
[patent_no_of_words] => 5976
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 257
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/127/08127357.pdf
[firstpage_image] =>[orig_patent_app_number] => 12943555
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/943555 | Method to detect SYN flood attack | Nov 29, 2010 | Issued |
Array
(
[id] => 8177144
[patent_doc_number] => 20120110641
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2012-05-03
[patent_title] => 'TRAFFIC STEERING SYSTEM'
[patent_app_type] => utility
[patent_app_number] => 12/913823
[patent_app_country] => US
[patent_app_date] => 2010-10-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 6455
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0110/20120110641.pdf
[firstpage_image] =>[orig_patent_app_number] => 12913823
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/913823 | Traffic steering system | Oct 27, 2010 | Issued |
Array
(
[id] => 5951634
[patent_doc_number] => 20110033047
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-02-10
[patent_title] => 'BRIDGED CRYPTOGRAPHIC VLAN'
[patent_app_type] => utility
[patent_app_number] => 12/880894
[patent_app_country] => US
[patent_app_date] => 2010-09-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5478
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0033/20110033047.pdf
[firstpage_image] =>[orig_patent_app_number] => 12880894
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/880894 | Bridged cryptographic VLAN | Sep 12, 2010 | Issued |
Array
(
[id] => 8180660
[patent_doc_number] => 08180046
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-05-15
[patent_title] => 'Method for making secure an electronic entity with encrypted access'
[patent_app_type] => utility
[patent_app_number] => 12/852637
[patent_app_country] => US
[patent_app_date] => 2010-08-09
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 2819
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 102
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/180/08180046.pdf
[firstpage_image] =>[orig_patent_app_number] => 12852637
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/852637 | Method for making secure an electronic entity with encrypted access | Aug 8, 2010 | Issued |
Array
(
[id] => 8318826
[patent_doc_number] => 08233617
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-07-31
[patent_title] => 'Resilient cryptographic scheme'
[patent_app_type] => utility
[patent_app_number] => 12/840008
[patent_app_country] => US
[patent_app_date] => 2010-07-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 4
[patent_no_of_words] => 1948
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 69
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12840008
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/840008 | Resilient cryptographic scheme | Jul 19, 2010 | Issued |
Array
(
[id] => 7697650
[patent_doc_number] => 20110228940
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2011-09-22
[patent_title] => 'REMOTE REGISTRATION FOR ENTERPRISE APPLICATIONS'
[patent_app_type] => utility
[patent_app_number] => 12/827399
[patent_app_country] => US
[patent_app_date] => 2010-06-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 16114
[patent_no_of_claims] => 25
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0228/20110228940.pdf
[firstpage_image] =>[orig_patent_app_number] => 12827399
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/827399 | Remote registration for enterprise applications | Jun 29, 2010 | Issued |
Array
(
[id] => 8861803
[patent_doc_number] => 08464357
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-06-11
[patent_title] => 'Methods and systems for fingerprint-based copyright protection of real-time content'
[patent_app_type] => utility
[patent_app_number] => 12/819452
[patent_app_country] => US
[patent_app_date] => 2010-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 1
[patent_figures_cnt] => 1
[patent_no_of_words] => 1898
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 159
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12819452
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/819452 | Methods and systems for fingerprint-based copyright protection of real-time content | Jun 20, 2010 | Issued |
Array
(
[id] => 8562032
[patent_doc_number] => 08336103
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2012-12-18
[patent_title] => 'Data structure for policy-based remediation selection'
[patent_app_type] => utility
[patent_app_number] => 12/819891
[patent_app_country] => US
[patent_app_date] => 2010-06-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 15
[patent_no_of_words] => 11585
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 242
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12819891
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/819891 | Data structure for policy-based remediation selection | Jun 20, 2010 | Issued |