Search

Paul E. Callahan

Examiner (ID: 7960, Phone: (571)272-3869 , Office: P/2437 )

Most Active Art Unit
2437
Art Unit(s)
2132, 2137, 2767, 2134, 2437
Total Applications
1103
Issued Applications
837
Pending Applications
106
Abandoned Applications
167

Applications

Application numberTitle of the applicationFiling DateStatus
Array ( [id] => 16069761 [patent_doc_number] => 10693852 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-06-23 [patent_title] => System for a secure encryption proxy in a content centric network [patent_app_type] => utility [patent_app_number] => 16/051897 [patent_app_country] => US [patent_app_date] => 2018-08-01 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 16 [patent_figures_cnt] => 22 [patent_no_of_words] => 12137 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 155 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16051897 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/051897
System for a secure encryption proxy in a content centric network Jul 31, 2018 Issued
Array ( [id] => 15825343 [patent_doc_number] => 10637880 [patent_country] => US [patent_kind] => B1 [patent_issue_date] => 2020-04-28 [patent_title] => Classifying sets of malicious indicators for detecting command and control communications associated with malware [patent_app_type] => utility [patent_app_number] => 16/043013 [patent_app_country] => US [patent_app_date] => 2018-07-23 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 10 [patent_figures_cnt] => 12 [patent_no_of_words] => 11650 [patent_no_of_claims] => 19 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 223 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16043013 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/043013
Classifying sets of malicious indicators for detecting command and control communications associated with malware Jul 22, 2018 Issued
Array ( [id] => 15413059 [patent_doc_number] => 20200026852 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-23 [patent_title] => USER INTERFACE FOR RESPONDING TO WIRELESS ATTACKS [patent_app_type] => utility [patent_app_number] => 16/040727 [patent_app_country] => US [patent_app_date] => 2018-07-20 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6908 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 98 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040727 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/040727
User interface for responding to wireless attacks Jul 19, 2018 Issued
Array ( [id] => 13600913 [patent_doc_number] => 20180352005 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-12-06 [patent_title] => DATA SENSITIVITY BASED AUTHENTICATION AND AUTHORIZATION [patent_app_type] => utility [patent_app_number] => 16/040340 [patent_app_country] => US [patent_app_date] => 2018-07-19 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9258 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -16 [patent_words_short_claim] => 2 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16040340 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/040340
Data sensitivity based authentication and authorization Jul 18, 2018 Issued
Array ( [id] => 13530345 [patent_doc_number] => 20180316715 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-11-01 [patent_title] => METHOD, SYSTEM, AND COMPUTER PROGRAM PRODUCT FOR AUTOMATICALLY MITIGATING VULNERABILITIES IN SOURCE CODE [patent_app_type] => utility [patent_app_number] => 16/027383 [patent_app_country] => US [patent_app_date] => 2018-07-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 7774 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -13 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16027383 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/027383
Method, system, and computer program product for automatically mitigating vulnerabilities in source code Jul 4, 2018 Issued
Array ( [id] => 15334007 [patent_doc_number] => 20200007333 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2020-01-02 [patent_title] => FEDERATED BLOCKCHAIN IDENTITY MODEL AND SECURE PERSONALLY IDENTIFIABLE INFORMATION DATA TRANSMISSION MODEL FOR RCS [patent_app_type] => utility [patent_app_number] => 16/025090 [patent_app_country] => US [patent_app_date] => 2018-07-02 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 9554 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 86 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16025090 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/025090
Federated blockchain identity model and secure personally identifiable information data transmission model for RCS Jul 1, 2018 Issued
Array ( [id] => 18668735 [patent_doc_number] => 11775638 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2023-10-03 [patent_title] => Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views [patent_app_type] => utility [patent_app_number] => 16/019761 [patent_app_country] => US [patent_app_date] => 2018-06-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 9 [patent_no_of_words] => 9742 [patent_no_of_claims] => 21 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 85 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16019761 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/019761
Identification and extraction of key forensics indicators of compromise using subject-specific filesystem views Jun 26, 2018 Issued
Array ( [id] => 16433991 [patent_doc_number] => 10834096 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-11-10 [patent_title] => Methods and systems for controlling access to a protected resource [patent_app_type] => utility [patent_app_number] => 16/000086 [patent_app_country] => US [patent_app_date] => 2018-06-05 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 7 [patent_figures_cnt] => 8 [patent_no_of_words] => 7217 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 179 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 16000086 [rel_patent_id] =>[rel_patent_doc_number] =>)
16/000086
Methods and systems for controlling access to a protected resource Jun 4, 2018 Issued
Array ( [id] => 13454117 [patent_doc_number] => 20180278601 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-09-27 [patent_title] => USING TEMPORARY CREDENTIALS IN GUEST MODE [patent_app_type] => utility [patent_app_number] => 15/994234 [patent_app_country] => US [patent_app_date] => 2018-05-31 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 6974 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 172 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15994234 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/994234
Using temporary credentials in guest mode May 30, 2018 Issued
Array ( [id] => 15186885 [patent_doc_number] => 20190364034 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-28 [patent_title] => AUTHORIZATION OF ANOTHER DEVICE FOR PARTICIPATION IN MULTI-FACTOR AUTHENTICATION [patent_app_type] => utility [patent_app_number] => 15/985913 [patent_app_country] => US [patent_app_date] => 2018-05-22 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5967 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 139 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15985913 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/985913
Authorization of another device for participation in multi-factor authentication May 21, 2018 Issued
Array ( [id] => 16146201 [patent_doc_number] => 10706172 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-07 [patent_title] => Controlled device, security management method, and security management system [patent_app_type] => utility [patent_app_number] => 15/983845 [patent_app_country] => US [patent_app_date] => 2018-05-18 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 8 [patent_figures_cnt] => 8 [patent_no_of_words] => 5499 [patent_no_of_claims] => 14 [patent_no_of_ind_claims] => 7 [patent_words_short_claim] => 125 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983845 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/983845
Controlled device, security management method, and security management system May 17, 2018 Issued
Array ( [id] => 16202837 [patent_doc_number] => 10728030 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-07-28 [patent_title] => System and method for key management in computing clusters [patent_app_type] => utility [patent_app_number] => 15/983021 [patent_app_country] => US [patent_app_date] => 2018-05-17 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 9 [patent_figures_cnt] => 9 [patent_no_of_words] => 5238 [patent_no_of_claims] => 20 [patent_no_of_ind_claims] => 3 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15983021 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/983021
System and method for key management in computing clusters May 16, 2018 Issued
Array ( [id] => 15156353 [patent_doc_number] => 20190356654 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-11-21 [patent_title] => COMPUTER IMPLEMENTED MONITORING PROCESS FOR PERSONALIZED EVENT DETECTION AND NOTIFICATION TRANSMISSION [patent_app_type] => utility [patent_app_number] => 15/979935 [patent_app_country] => US [patent_app_date] => 2018-05-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 11103 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 161 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15979935 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/979935
Computer implemented monitoring process for personalized event detection and notification transmission May 14, 2018 Issued
Array ( [id] => 16309841 [patent_doc_number] => 10778661 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-15 [patent_title] => Secure distribution of secret key using a monotonic counter [patent_app_type] => utility [patent_app_number] => 15/965731 [patent_app_country] => US [patent_app_date] => 2018-04-27 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 5 [patent_figures_cnt] => 5 [patent_no_of_words] => 9715 [patent_no_of_claims] => 17 [patent_no_of_ind_claims] => 2 [patent_words_short_claim] => 141 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15965731 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/965731
Secure distribution of secret key using a monotonic counter Apr 26, 2018 Issued
Array ( [id] => 14967237 [patent_doc_number] => 20190311097 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-10 [patent_title] => BIOMETRIC SECURITY DEVICE [patent_app_type] => utility [patent_app_number] => 15/947956 [patent_app_country] => US [patent_app_date] => 2018-04-09 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5020 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -21 [patent_words_short_claim] => 256 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15947956 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/947956
Biometric security device Apr 8, 2018 Issued
Array ( [id] => 14940609 [patent_doc_number] => 20190305943 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => Digital asset transfer system for secure digital asset transactions [patent_app_type] => utility [patent_app_number] => 15/932644 [patent_app_country] => US [patent_app_date] => 2018-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5979 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932644 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/932644
Digital asset transfer system for secure digital asset transactions Mar 29, 2018 Issued
Array ( [id] => 14940609 [patent_doc_number] => 20190305943 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-10-03 [patent_title] => Digital asset transfer system for secure digital asset transactions [patent_app_type] => utility [patent_app_number] => 15/932644 [patent_app_country] => US [patent_app_date] => 2018-03-30 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 5979 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -18 [patent_words_short_claim] => 87 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15932644 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/932644
Digital asset transfer system for secure digital asset transactions Mar 29, 2018 Issued
Array ( [id] => 16340143 [patent_doc_number] => 10791118 [patent_country] => US [patent_kind] => B2 [patent_issue_date] => 2020-09-29 [patent_title] => Authenticating network services provided by a network [patent_app_type] => utility [patent_app_number] => 15/940573 [patent_app_country] => US [patent_app_date] => 2018-03-29 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 11 [patent_figures_cnt] => 11 [patent_no_of_words] => 11206 [patent_no_of_claims] => 25 [patent_no_of_ind_claims] => 4 [patent_words_short_claim] => 106 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => patent [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15940573 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/940573
Authenticating network services provided by a network Mar 28, 2018 Issued
Array ( [id] => 13308361 [patent_doc_number] => 20180205717 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2018-07-19 [patent_title] => SPLIT AUTHENTICATION NETWORK SYSTEMS AND METHODS [patent_app_type] => utility [patent_app_number] => 15/922019 [patent_app_country] => US [patent_app_date] => 2018-03-15 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10680 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -17 [patent_words_short_claim] => 148 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15922019 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/922019
Split authentication network systems and methods Mar 14, 2018 Issued
Array ( [id] => 14658261 [patent_doc_number] => 20190236259 [patent_country] => US [patent_kind] => A1 [patent_issue_date] => 2019-08-01 [patent_title] => METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES [patent_app_type] => utility [patent_app_number] => 15/921235 [patent_app_country] => US [patent_app_date] => 2018-03-14 [patent_effective_date] => 0000-00-00 [patent_drawing_sheets_cnt] => 0 [patent_figures_cnt] => 0 [patent_no_of_words] => 10482 [patent_no_of_claims] => 0 [patent_no_of_ind_claims] => -22 [patent_words_short_claim] => 198 [patent_maintenance] => 1 [patent_no_of_assignments] => 0 [patent_current_assignee] =>[type] => publication [pdf_file] =>[firstpage_image] =>[orig_patent_app_number] => 15921235 [rel_patent_id] =>[rel_patent_doc_number] =>)
15/921235
METHOD FOR 3D GRAPHICAL AUTHENTICATION ON ELECTRONIC DEVICES Mar 13, 2018 Abandoned
Menu