
Paul E. Callahan
Examiner (ID: 7960, Phone: (571)272-3869 , Office: P/2437 )
| Most Active Art Unit | 2437 |
| Art Unit(s) | 2132, 2137, 2767, 2134, 2437 |
| Total Applications | 1103 |
| Issued Applications | 837 |
| Pending Applications | 106 |
| Abandoned Applications | 167 |
Applications
| Application number | Title of the application | Filing Date | Status |
|---|---|---|---|
Array
(
[id] => 15998615
[patent_doc_number] => 20200175178
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-06-04
[patent_title] => ENCRYPTED DATA EXCHANGE
[patent_app_type] => utility
[patent_app_number] => 16/778989
[patent_app_country] => US
[patent_app_date] => 2020-01-31
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 8492
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -15
[patent_words_short_claim] => 218
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16778989
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/778989 | Encrypted data exchange | Jan 30, 2020 | Issued |
Array
(
[id] => 16818921
[patent_doc_number] => 11003754
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-05-11
[patent_title] => Method and apparatus for user authentication based on feature information
[patent_app_type] => utility
[patent_app_number] => 16/776047
[patent_app_country] => US
[patent_app_date] => 2020-01-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 11313
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 208
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16776047
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/776047 | Method and apparatus for user authentication based on feature information | Jan 28, 2020 | Issued |
Array
(
[id] => 18344094
[patent_doc_number] => 11641584
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2023-05-02
[patent_title] => Protecting from automatic reconnection with Wi-Fi access points having bad reputations
[patent_app_type] => utility
[patent_app_number] => 16/775031
[patent_app_country] => US
[patent_app_date] => 2020-01-28
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 6898
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 172
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16775031
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/775031 | Protecting from automatic reconnection with Wi-Fi access points having bad reputations | Jan 27, 2020 | Issued |
Array
(
[id] => 17446697
[patent_doc_number] => 20220067202
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2022-03-03
[patent_title] => METHOD FOR CREATING AVATARS FOR PROTECTING SENSITIVE DATA
[patent_app_type] => utility
[patent_app_number] => 17/420735
[patent_app_country] => US
[patent_app_date] => 2020-01-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6892
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -13
[patent_words_short_claim] => 135
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17420735
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/420735 | Method for creating avatars for protecting sensitive data | Jan 2, 2020 | Issued |
Array
(
[id] => 17019384
[patent_doc_number] => 11089040
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-08-10
[patent_title] => Cognitive analysis of security data with signal flow-based graph exploration
[patent_app_type] => utility
[patent_app_number] => 16/728471
[patent_app_country] => US
[patent_app_date] => 2019-12-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 13
[patent_no_of_words] => 11204
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 116
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16728471
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/728471 | Cognitive analysis of security data with signal flow-based graph exploration | Dec 26, 2019 | Issued |
Array
(
[id] => 18291508
[patent_doc_number] => 11620378
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2023-04-04
[patent_title] => Systems and methods for proactive and reactive data security
[patent_app_type] => utility
[patent_app_number] => 16/698328
[patent_app_country] => US
[patent_app_date] => 2019-11-27
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 13504
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 8
[patent_words_short_claim] => 227
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16698328
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/698328 | Systems and methods for proactive and reactive data security | Nov 26, 2019 | Issued |
Array
(
[id] => 15936563
[patent_doc_number] => 20200159915
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-05-21
[patent_title] => Selective Import/Export Address Table Filtering
[patent_app_type] => utility
[patent_app_number] => 16/683816
[patent_app_country] => US
[patent_app_date] => 2019-11-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6422
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 77
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16683816
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/683816 | Selective import/export address table filtering | Nov 13, 2019 | Issued |
Array
(
[id] => 16826606
[patent_doc_number] => 20210141899
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-05-13
[patent_title] => ENHANCING MEMORY SAFE PROGRAMMING USING A PAGE FRAME TAG MECHANISM
[patent_app_type] => utility
[patent_app_number] => 16/678904
[patent_app_country] => US
[patent_app_date] => 2019-11-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6836
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 121
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16678904
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/678904 | Enhancing memory safe programming using a page frame tag mechanism | Nov 7, 2019 | Issued |
Array
(
[id] => 16758805
[patent_doc_number] => 10977355
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-04-13
[patent_title] => Authentication method and device through face recognition
[patent_app_type] => utility
[patent_app_number] => 16/663232
[patent_app_country] => US
[patent_app_date] => 2019-10-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 3
[patent_figures_cnt] => 3
[patent_no_of_words] => 7988
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 280
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16663232
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/663232 | Authentication method and device through face recognition | Oct 23, 2019 | Issued |
Array
(
[id] => 15459723
[patent_doc_number] => 20200042686
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-02-06
[patent_title] => METHOD AND APPARATUS FOR USER AUTHENTICATION BASED ON FEATURE INFORMATION
[patent_app_type] => utility
[patent_app_number] => 16/599599
[patent_app_country] => US
[patent_app_date] => 2019-10-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 11299
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -16
[patent_words_short_claim] => 84
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16599599
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/599599 | Method and apparatus for user authentication based on feature information | Oct 10, 2019 | Issued |
Array
(
[id] => 17545114
[patent_doc_number] => 11310258
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2022-04-19
[patent_title] => Network portion risk assessment
[patent_app_type] => utility
[patent_app_number] => 16/583023
[patent_app_country] => US
[patent_app_date] => 2019-09-25
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 16103
[patent_no_of_claims] => 17
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 177
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16583023
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/583023 | Network portion risk assessment | Sep 24, 2019 | Issued |
Array
(
[id] => 16944951
[patent_doc_number] => 11057210
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2021-07-06
[patent_title] => Distribution and recovery of a user secret
[patent_app_type] => utility
[patent_app_number] => 16/550836
[patent_app_country] => US
[patent_app_date] => 2019-08-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 9
[patent_figures_cnt] => 9
[patent_no_of_words] => 12772
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 193
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16550836
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/550836 | Distribution and recovery of a user secret | Aug 25, 2019 | Issued |
Array
(
[id] => 15623337
[patent_doc_number] => 20200082073
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2020-03-12
[patent_title] => SYSTEMS AND METHODS TO DETECT AND NEUTRALIZE MALWARE INFECTED ELECTRONIC COMMUNICATIONS
[patent_app_type] => utility
[patent_app_number] => 16/546944
[patent_app_country] => US
[patent_app_date] => 2019-08-21
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 5744
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => 0
[patent_words_short_claim] => 79
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16546944
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/546944 | Systems and methods to detect and neutralize malware infected electronic communications | Aug 20, 2019 | Issued |
Array
(
[id] => 16630615
[patent_doc_number] => 20210049268
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2021-02-18
[patent_title] => System, Method, and Apparatus for Blocking False Alerts
[patent_app_type] => utility
[patent_app_number] => 16/541390
[patent_app_country] => US
[patent_app_date] => 2019-08-15
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 3778
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 54
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16541390
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/541390 | System, Method, and Apparatus for Blocking False Alerts | Aug 14, 2019 | Abandoned |
Array
(
[id] => 15261589
[patent_doc_number] => 20190379528
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-12-12
[patent_title] => METHODS, SYSTEMS, AND MEDIA FOR USING DYNAMIC PUBLIC KEY INFRASTRUCTURE TO SEND AND RECEIVE ENCRYPTED MESSAGES
[patent_app_type] => utility
[patent_app_number] => 16/530445
[patent_app_country] => US
[patent_app_date] => 2019-08-02
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6867
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -18
[patent_words_short_claim] => 93
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16530445
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/530445 | Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages | Aug 1, 2019 | Issued |
Array
(
[id] => 15156411
[patent_doc_number] => 20190356683
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-21
[patent_title] => CYBER-SECURITY PRESENCE MONITORING AND ASSESSMENT
[patent_app_type] => utility
[patent_app_number] => 16/526124
[patent_app_country] => US
[patent_app_date] => 2019-07-30
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 6975
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 72
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16526124
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/526124 | Cyber-security presence monitoring and assessment | Jul 29, 2019 | Issued |
Array
(
[id] => 15095019
[patent_doc_number] => 20190342321
[patent_country] => US
[patent_kind] => A1
[patent_issue_date] => 2019-11-07
[patent_title] => LEARNING INTERNAL RANGES FROM NETWORK TRAFFIC DATA TO AUGMENT ANOMALY DETECTION SYSTEMS
[patent_app_type] => utility
[patent_app_number] => 16/517748
[patent_app_country] => US
[patent_app_date] => 2019-07-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 0
[patent_figures_cnt] => 0
[patent_no_of_words] => 10518
[patent_no_of_claims] => 0
[patent_no_of_ind_claims] => -17
[patent_words_short_claim] => 82
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => publication
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16517748
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/517748 | Learning internal ranges from network traffic data to augment anomaly detection systems | Jul 21, 2019 | Issued |
Array
(
[id] => 19872748
[patent_doc_number] => 12265609
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2025-04-01
[patent_title] => Training device, detection system, training method, and training program
[patent_app_type] => utility
[patent_app_number] => 17/624579
[patent_app_country] => US
[patent_app_date] => 2019-07-18
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 16
[patent_figures_cnt] => 16
[patent_no_of_words] => 7933
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 151
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17624579
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/624579 | Training device, detection system, training method, and training program | Jul 17, 2019 | Issued |
Array
(
[id] => 16594708
[patent_doc_number] => 10903992
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2021-01-26
[patent_title] => Systems and methods for encrypting communication over a fiber optic line
[patent_app_type] => utility
[patent_app_number] => 16/509999
[patent_app_country] => US
[patent_app_date] => 2019-07-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 8
[patent_no_of_words] => 7045
[patent_no_of_claims] => 20
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 334
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16509999
[rel_patent_id] =>[rel_patent_doc_number] =>) 16/509999 | Systems and methods for encrypting communication over a fiber optic line | Jul 11, 2019 | Issued |
Array
(
[id] => 19276158
[patent_doc_number] => 12026286
[patent_country] => US
[patent_kind] => B2
[patent_issue_date] => 2024-07-02
[patent_title] => Executing containers during idle states
[patent_app_type] => utility
[patent_app_number] => 17/419067
[patent_app_country] => US
[patent_app_date] => 2019-07-10
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 4341
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 59
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 17419067
[rel_patent_id] =>[rel_patent_doc_number] =>) 17/419067 | Executing containers during idle states | Jul 9, 2019 | Issued |