
Patricia C. Mallari
Supervisory Patent Examiner (ID: 4956, Phone: (571)272-4729 , Office: P/3735 )
| Most Active Art Unit | 3735 |
| Art Unit(s) | 1600, 3735, 3736, 3791 |
| Total Applications | 826 |
| Issued Applications | 495 |
| Pending Applications | 107 |
| Abandoned Applications | 230 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 5363213
[patent_doc_number] => 20090038007
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-02-05
[patent_title] => 'METHOD AND APPARATUS FOR MANAGING CLIENT REVOCATION LIST'
[patent_app_type] => utility
[patent_app_number] => 12/119848
[patent_app_country] => US
[patent_app_date] => 2008-05-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 3380
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0038/20090038007.pdf
[firstpage_image] =>[orig_patent_app_number] => 12119848
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/119848 | METHOD AND APPARATUS FOR MANAGING CLIENT REVOCATION LIST | May 12, 2008 | Abandoned |
Array
(
[id] => 4841869
[patent_doc_number] => 20080282355
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-11-13
[patent_title] => 'DOCUMENT CONTAINER DATA STRUCTURE AND METHODS THEREOF'
[patent_app_type] => utility
[patent_app_number] => 12/119265
[patent_app_country] => US
[patent_app_date] => 2008-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 4546
[patent_no_of_claims] => 22
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0282/20080282355.pdf
[firstpage_image] =>[orig_patent_app_number] => 12119265
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/119265 | DOCUMENT CONTAINER DATA STRUCTURE AND METHODS THEREOF | May 11, 2008 | Abandoned |
Array
(
[id] => 5560053
[patent_doc_number] => 20090271630
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-10-29
[patent_title] => 'AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND TERMINAL DEVICE'
[patent_app_type] => utility
[patent_app_number] => 12/118944
[patent_app_country] => US
[patent_app_date] => 2008-05-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 17
[patent_figures_cnt] => 17
[patent_no_of_words] => 10144
[patent_no_of_claims] => 13
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0271/20090271630.pdf
[firstpage_image] =>[orig_patent_app_number] => 12118944
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/118944 | Authentication system, authentication method and terminal device | May 11, 2008 | Issued |
Array
(
[id] => 5312243
[patent_doc_number] => 20090019524
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-01-15
[patent_title] => 'System and method for network operation'
[patent_app_type] => utility
[patent_app_number] => 12/150450
[patent_app_country] => US
[patent_app_date] => 2008-04-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 13
[patent_figures_cnt] => 13
[patent_no_of_words] => 17322
[patent_no_of_claims] => 14
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0019/20090019524.pdf
[firstpage_image] =>[orig_patent_app_number] => 12150450
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/150450 | System and method for network operation | Apr 27, 2008 | Abandoned |
Array
(
[id] => 7548149
[patent_doc_number] => 08056130
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-11-08
[patent_title] => 'Real time monitoring and analysis of events from multiple network security devices'
[patent_app_type] => utility
[patent_app_number] => 12/098322
[patent_app_country] => US
[patent_app_date] => 2008-04-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 5
[patent_no_of_words] => 8528
[patent_no_of_claims] => 35
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 81
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/056/08056130.pdf
[firstpage_image] =>[orig_patent_app_number] => 12098322
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/098322 | Real time monitoring and analysis of events from multiple network security devices | Apr 3, 2008 | Issued |
Array
(
[id] => 4951385
[patent_doc_number] => 20080307511
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-12-11
[patent_title] => 'Network invitation arrangement and method'
[patent_app_type] => utility
[patent_app_number] => 12/079312
[patent_app_country] => US
[patent_app_date] => 2008-03-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 7907
[patent_no_of_claims] => 148
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0307/20080307511.pdf
[firstpage_image] =>[orig_patent_app_number] => 12079312
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/079312 | Network invitation arrangement and method | Mar 25, 2008 | Issued |
Array
(
[id] => 5535283
[patent_doc_number] => 20090235071
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-09-17
[patent_title] => 'CERTIFICATE ASSIGNMENT STRATEGIES FOR EFFICIENT OPERATION OF THE PKI-BASED SECURITY ARCHITECTURE IN A VEHICULAR NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/047865
[patent_app_country] => US
[patent_app_date] => 2008-03-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5823
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0235/20090235071.pdf
[firstpage_image] =>[orig_patent_app_number] => 12047865
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/047865 | Certificate assignment strategies for efficient operation of the PKI-based security architecture in a vehicular network | Mar 12, 2008 | Issued |
Array
(
[id] => 4882302
[patent_doc_number] => 20080155685
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-06-26
[patent_title] => 'USER CONTROLS FOR A COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 12/037729
[patent_app_country] => US
[patent_app_date] => 2008-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0155/20080155685.pdf
[firstpage_image] =>[orig_patent_app_number] => 12037729
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/037729 | User controls for a computer | Feb 25, 2008 | Issued |
Array
(
[id] => 5516736
[patent_doc_number] => 20090217043
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-08-27
[patent_title] => 'METHOD AND SYSTEM FOR MUTUAL AUTHENTICATION OF NODES IN A WIRELESS COMMUNICATION NETWORK'
[patent_app_type] => utility
[patent_app_number] => 12/037516
[patent_app_country] => US
[patent_app_date] => 2008-02-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 5684
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0217/20090217043.pdf
[firstpage_image] =>[orig_patent_app_number] => 12037516
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/037516 | Method and system for mutual authentication of nodes in a wireless communication network | Feb 25, 2008 | Issued |
Array
(
[id] => 87011
[patent_doc_number] => 07748029
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2010-06-29
[patent_title] => 'Authentication query strategizer and results compiler'
[patent_app_type] => utility
[patent_app_number] => 12/028718
[patent_app_country] => US
[patent_app_date] => 2008-02-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 17
[patent_no_of_words] => 8920
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/748/07748029.pdf
[firstpage_image] =>[orig_patent_app_number] => 12028718
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/028718 | Authentication query strategizer and results compiler | Feb 7, 2008 | Issued |
Array
(
[id] => 116564
[patent_doc_number] => 07721105
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2010-05-18
[patent_title] => 'Repurposing digitally signed information'
[patent_app_type] => utility
[patent_app_number] => 12/023956
[patent_app_country] => US
[patent_app_date] => 2008-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 5620
[patent_no_of_claims] => 39
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 110
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/07/721/07721105.pdf
[firstpage_image] =>[orig_patent_app_number] => 12023956
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/023956 | Repurposing digitally signed information | Jan 30, 2008 | Issued |
Array
(
[id] => 7694020
[patent_doc_number] => 20080120724
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-22
[patent_title] => 'ENSURING THE COPY PROTECTION OF DIGITAL DATA'
[patent_app_type] => utility
[patent_app_number] => 12/022029
[patent_app_country] => US
[patent_app_date] => 2008-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3359
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20080120724.pdf
[firstpage_image] =>[orig_patent_app_number] => 12022029
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/022029 | ENSURING THE COPY PROTECTION OF DIGITAL DATA | Jan 28, 2008 | Abandoned |
Array
(
[id] => 4723459
[patent_doc_number] => 20080244743
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-10-02
[patent_title] => 'Computer System Architecture And Method Providing Operating-System Independent Virus-, Hacker-, and Cyber-Terror Immune Processing Environments'
[patent_app_type] => utility
[patent_app_number] => 12/021190
[patent_app_country] => US
[patent_app_date] => 2008-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 24
[patent_no_of_words] => 40307
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0244/20080244743.pdf
[firstpage_image] =>[orig_patent_app_number] => 12021190
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/021190 | Computer System Architecture And Method Providing Operating-System Independent Virus-, Hacker-, and Cyber-Terror Immune Processing Environments | Jan 27, 2008 | Abandoned |
Array
(
[id] => 7694051
[patent_doc_number] => 20080120693
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2008-05-22
[patent_title] => 'USER CONTROLS FOR A COMPUTER'
[patent_app_type] => utility
[patent_app_number] => 12/019438
[patent_app_country] => US
[patent_app_date] => 2008-01-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 6703
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0120/20080120693.pdf
[firstpage_image] =>[orig_patent_app_number] => 12019438
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/019438 | User controls for a computer | Jan 23, 2008 | Issued |
Array
(
[id] => 6463887
[patent_doc_number] => 20100146258
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2010-06-10
[patent_title] => 'DATA TRANSMISSION SYSTEMS'
[patent_app_type] => utility
[patent_app_number] => 12/522560
[patent_app_country] => US
[patent_app_date] => 2008-01-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3197
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0146/20100146258.pdf
[firstpage_image] =>[orig_patent_app_number] => 12522560
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/522560 | Data transmission systems | Jan 7, 2008 | Issued |
Array
(
[id] => 9103037
[patent_doc_number] => 08566931
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2013-10-22
[patent_title] => 'Protection of information contained in an electronic circuit'
[patent_app_type] => utility
[patent_app_number] => 12/521772
[patent_app_country] => US
[patent_app_date] => 2008-01-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 28
[patent_no_of_words] => 7256
[patent_no_of_claims] => 23
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 194
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 12521772
[rel_patent_id] =>[rel_patent_doc_number] =>) 12/521772 | Protection of information contained in an electronic circuit | Jan 3, 2008 | Issued |
Array
(
[id] => 7529980
[patent_doc_number] => 08046586
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2011-10-25
[patent_title] => 'Method and system for determining the compliance of encrypted and non-encrypted display outputs'
[patent_app_type] => utility
[patent_app_number] => 11/957378
[patent_app_country] => US
[patent_app_date] => 2007-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 4308
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 80
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/046/08046586.pdf
[firstpage_image] =>[orig_patent_app_number] => 11957378
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/957378 | Method and system for determining the compliance of encrypted and non-encrypted display outputs | Dec 13, 2007 | Issued |
Array
(
[id] => 5267091
[patent_doc_number] => 20090119776
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-05-07
[patent_title] => 'METHOD AND SYSTEM FOR PROVIDING WIRELESS VULNERABILITY MANAGEMENT FOR LOCAL AREA COMPUTER NETWORKS'
[patent_app_type] => utility
[patent_app_number] => 11/956357
[patent_app_country] => US
[patent_app_date] => 2007-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 21
[patent_figures_cnt] => 21
[patent_no_of_words] => 17174
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0119/20090119776.pdf
[firstpage_image] =>[orig_patent_app_number] => 11956357
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/956357 | Method and system for providing wireless vulnerability management for local area computer networks | Dec 13, 2007 | Issued |
Array
(
[id] => 5548526
[patent_doc_number] => 20090158403
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2009-06-18
[patent_title] => 'METHOD AND SYSTEM FOR PERMITTING OR DENYING SERVICE'
[patent_app_type] => utility
[patent_app_number] => 11/956572
[patent_app_country] => US
[patent_app_date] => 2007-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9358
[patent_no_of_claims] => 42
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] => publications/A1/0158/20090158403.pdf
[firstpage_image] =>[orig_patent_app_number] => 11956572
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/956572 | METHOD AND SYSTEM FOR PERMITTING OR DENYING SERVICE | Dec 13, 2007 | Abandoned |
Array
(
[id] => 7543092
[patent_doc_number] => 08060941
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2011-11-15
[patent_title] => 'Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain'
[patent_app_type] => utility
[patent_app_number] => 11/957408
[patent_app_country] => US
[patent_app_date] => 2007-12-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 8827
[patent_no_of_claims] => 28
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/08/060/08060941.pdf
[firstpage_image] =>[orig_patent_app_number] => 11957408
[rel_patent_id] =>[rel_patent_doc_number] =>) 11/957408 | Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain | Dec 13, 2007 | Issued |