
Paul E. Callahan
Examiner (ID: 7960, Phone: (571)272-3869 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2132, 2137, 2767, 2134, 2437 |
| Total Applications | 1103 |
| Issued Applications | 837 |
| Pending Applications | 106 |
| Abandoned Applications | 167 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 11215776
[patent_doc_number] => 09444826
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-09-13
[patent_title] => 'Method and system for filtering communication'
[patent_app_type] => utility
[patent_app_number] => 14/577535
[patent_app_country] => US
[patent_app_date] => 2014-12-19
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5126
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14577535
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/577535 | Method and system for filtering communication | Dec 18, 2014 | Issued |
Array
(
[id] => 10287313
[patent_doc_number] => 20150172311
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-06-18
[patent_title] => 'COLLABORATIVE SYSTEM FOR CYBER SECURITY ANALYSIS'
[patent_app_type] => utility
[patent_app_number] => 14/571035
[patent_app_country] => US
[patent_app_date] => 2014-12-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 9746
[patent_no_of_claims] => 58
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14571035
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/571035 | COLLABORATIVE SYSTEM FOR CYBER SECURITY ANALYSIS | Dec 14, 2014 | Abandoned |
Array
(
[id] => 12055493
[patent_doc_number] => 20170331838
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-11-16
[patent_title] => 'METHODS AND COMPUTING DEVICES TO REGULATE PACKETS IN A SOFTWARE DEFINED NETWORK'
[patent_app_type] => utility
[patent_app_number] => 15/532344
[patent_app_country] => US
[patent_app_date] => 2014-12-01
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 5307
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15532344
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/532344 | METHODS AND COMPUTING DEVICES TO REGULATE PACKETS IN A SOFTWARE DEFINED NETWORK | Nov 30, 2014 | Abandoned |
Array
(
[id] => 10159591
[patent_doc_number] => 09191376
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2015-11-17
[patent_title] => 'Securing digital content system and method'
[patent_app_type] => utility
[patent_app_number] => 14/553209
[patent_app_country] => US
[patent_app_date] => 2014-11-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 9634
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 124
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14553209
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/553209 | Securing digital content system and method | Nov 24, 2014 | Issued |
Array
(
[id] => 10243218
[patent_doc_number] => 20150128213
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-05-07
[patent_title] => 'POLICY ENFORCEMENT'
[patent_app_type] => utility
[patent_app_number] => 14/534971
[patent_app_country] => US
[patent_app_date] => 2014-11-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 4
[patent_no_of_words] => 3901
[patent_no_of_claims] => 6
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14534971
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/534971 | POLICY ENFORCEMENT | Nov 5, 2014 | Abandoned |
Array
(
[id] => 9801053
[patent_doc_number] => 20150012997
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-08
[patent_title] => 'CODE DOMAIN ISOLATION'
[patent_app_type] => utility
[patent_app_number] => 14/498404
[patent_app_country] => US
[patent_app_date] => 2014-09-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7230
[patent_no_of_claims] => 62
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14498404
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/498404 | Code domain isolation | Sep 25, 2014 | Issued |
Array
(
[id] => 10603131
[patent_doc_number] => 09323696
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2016-04-26
[patent_title] => 'Data security system'
[patent_app_type] => utility
[patent_app_number] => 14/480283
[patent_app_country] => US
[patent_app_date] => 2014-09-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 14
[patent_figures_cnt] => 22
[patent_no_of_words] => 10246
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 158
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14480283
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/480283 | Data security system | Sep 7, 2014 | Issued |
Array
(
[id] => 11960454
[patent_doc_number] => 20170264606
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-09-14
[patent_title] => 'User Equipment Identity Valid for Heterogeneous Networks'
[patent_app_type] => utility
[patent_app_number] => 15/504044
[patent_app_country] => US
[patent_app_date] => 2014-08-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 18
[patent_figures_cnt] => 18
[patent_no_of_words] => 11653
[patent_no_of_claims] => 24
[patent_no_of_ind_claims] => 10
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15504044
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/504044 | User equipment identity valid for heterogeneous networks | Aug 27, 2014 | Issued |
Array
(
[id] => 11854056
[patent_doc_number] => 20170228548
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2017-08-10
[patent_title] => 'ENCRYPTED CODE EXECUTION'
[patent_app_type] => utility
[patent_app_number] => 15/501704
[patent_app_country] => US
[patent_app_date] => 2014-08-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3043
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15501704
[rel_patent_id] =>[rel_patent_doc_number] =>) 15/501704 | ENCRYPTED CODE EXECUTION | Aug 19, 2014 | Abandoned |
Array
(
[id] => 10948862
[patent_doc_number] => 20140351883
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2014-11-27
[patent_title] => 'E-MAIL FIREWALL WITH POLICY-BASED CRYPTOSECURITY'
[patent_app_type] => utility
[patent_app_number] => 14/453441
[patent_app_country] => US
[patent_app_date] => 2014-08-06
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 10
[patent_figures_cnt] => 10
[patent_no_of_words] => 6440
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14453441
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/453441 | E-mail firewall with policy-based cryptosecurity | Aug 5, 2014 | Issued |
Array
(
[id] => 10478564
[patent_doc_number] => 20150363581
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-12-17
[patent_title] => 'SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A COMPUTING DEVICE'
[patent_app_type] => utility
[patent_app_number] => 14/306036
[patent_app_country] => US
[patent_app_date] => 2014-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 13515
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14306036
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/306036 | Systems and methods for authenticating a user based on a computing device | Jun 15, 2014 | Issued |
Array
(
[id] => 13213225
[patent_doc_number] => 10120986
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-11-06
[patent_title] => Controlling execution of a software application on an execution platform in a local network
[patent_app_type] => utility
[patent_app_number] => 14/305771
[patent_app_country] => US
[patent_app_date] => 2014-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 2
[patent_no_of_words] => 3437
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 262
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14305771
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/305771 | Controlling execution of a software application on an execution platform in a local network | Jun 15, 2014 | Issued |
Array
(
[id] => 9814517
[patent_doc_number] => 20150026462
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-01-22
[patent_title] => 'METHOD AND SYSTEM FOR ACCESS-CONTROLLED DECRYPTION IN BIG DATA STORES'
[patent_app_type] => utility
[patent_app_number] => 14/304902
[patent_app_country] => US
[patent_app_date] => 2014-06-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3485
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304902
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304902 | METHOD AND SYSTEM FOR ACCESS-CONTROLLED DECRYPTION IN BIG DATA STORES | Jun 13, 2014 | Abandoned |
Array
(
[id] => 13008043
[patent_doc_number] => 10027702
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-07-17
[patent_title] => Identification of malicious shortened uniform resource locators
[patent_app_type] => utility
[patent_app_number] => 14/304001
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 8
[patent_no_of_words] => 3922
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304001
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304001 | Identification of malicious shortened uniform resource locators | Jun 12, 2014 | Issued |
Array
(
[id] => 9934194
[patent_doc_number] => 20150082386
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'METHOD AND SYSTEM FOR SHARING CONTENT FILES USING A COMPUTER SYSTEM AND DATA NETWORK'
[patent_app_type] => utility
[patent_app_number] => 14/303927
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 53
[patent_figures_cnt] => 53
[patent_no_of_words] => 5427
[patent_no_of_claims] => 3
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303927
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/303927 | Method and system for sharing content files using a computer system and data network | Jun 12, 2014 | Issued |
Array
(
[id] => 12296742
[patent_doc_number] => 09935939
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-04-03
[patent_title] => Keyboard login manager
[patent_app_type] => utility
[patent_app_number] => 14/304047
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 11
[patent_figures_cnt] => 11
[patent_no_of_words] => 8620
[patent_no_of_claims] => 19
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 161
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304047
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304047 | Keyboard login manager | Jun 12, 2014 | Issued |
Array
(
[id] => 13120793
[patent_doc_number] => 10078750
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2018-09-18
[patent_title] => Methods and systems for finding compromised social networking accounts
[patent_app_type] => utility
[patent_app_number] => 14/303986
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 4561
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 67
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303986
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/303986 | Methods and systems for finding compromised social networking accounts | Jun 12, 2014 | Issued |
Array
(
[id] => 9933848
[patent_doc_number] => 20150082040
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2015-03-19
[patent_title] => 'METHOD, INFORMATION SERVICE SYSTEM AND PROGRAM FOR INFORMATION ENCRYPTION/DECRYPTION'
[patent_app_type] => utility
[patent_app_number] => 14/304255
[patent_app_country] => US
[patent_app_date] => 2014-06-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 6950
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 0
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14304255
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/304255 | Method, information service system and program for information encryption/decryption | Jun 12, 2014 | Issued |
Array
(
[id] => 13032189
[patent_doc_number] => 10038726
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2018-07-31
[patent_title] => Data sensitivity based authentication and authorization
[patent_app_type] => utility
[patent_app_number] => 14/303461
[patent_app_country] => US
[patent_app_date] => 2014-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 9258
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 252
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14303461
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/303461 | Data sensitivity based authentication and authorization | Jun 11, 2014 | Issued |
Array
(
[id] => 11552661
[patent_doc_number] => 09621529
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2017-04-11
[patent_title] => 'Information processing system, apparatus, and method'
[patent_app_type] => utility
[patent_app_number] => 14/301428
[patent_app_country] => US
[patent_app_date] => 2014-06-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 16
[patent_no_of_words] => 13441
[patent_no_of_claims] => 12
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 279
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 14301428
[rel_patent_id] =>[rel_patent_doc_number] =>) 14/301428 | Information processing system, apparatus, and method | Jun 10, 2014 | Issued |